2025-07-10 11:59:53,958 - xtesting.ci.run_tests - INFO - Deployment description: +-------------------------+------------------------------------------------------------+ | ENV VAR | VALUE | +-------------------------+------------------------------------------------------------+ | CI_LOOP | daily | | DEBUG | false | | DEPLOY_SCENARIO | k8-nosdn-nofeature-noha | | INSTALLER_TYPE | unknown | | BUILD_TAG | 0GTEQ6V2Z5CU | | NODE_NAME | v1.32 | | TEST_DB_URL | http://testresults.opnfv.org/test/api/v1/results | | TEST_DB_EXT_URL | http://testresults.opnfv.org/test/api/v1/results | | S3_ENDPOINT_URL | https://storage.googleapis.com | | S3_DST_URL | s3://artifacts.opnfv.org/functest- | | | kubernetes/0GTEQ6V2Z5CU/functest-kubernetes-opnfv- | | | functest-kubernetes- | | | cnf-v1.32-cnf_testsuite_workload-run-16 | | HTTP_DST_URL | http://artifacts.opnfv.org/functest- | | | kubernetes/0GTEQ6V2Z5CU/functest-kubernetes-opnfv- | | | functest-kubernetes- | | | cnf-v1.32-cnf_testsuite_workload-run-16 | +-------------------------+------------------------------------------------------------+ 2025-07-10 11:59:53,972 - xtesting.ci.run_tests - INFO - Loading test case 'cnf_testsuite_workload'... 2025-07-10 11:59:54,314 - xtesting.ci.run_tests - INFO - Running test case 'cnf_testsuite_workload'... 2025-07-10 12:00:04,977 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite setup -l debug CNF TestSuite version: v1.4.4 Successfully created directories for cnf-testsuite [2025-07-10 11:59:54] INFO -- CNTI: VERSION: v1.4.4 [2025-07-10 11:59:54] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-07-10 11:59:54] DEBUG -- CNTI: helm_local_install [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 11:59:54] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. Global helm found. Version: v3.17.0 [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v2?: [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 11:59:54] DEBUG -- CNTI-Helm.helm_local_response.cmd: command: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm version No Local helm version found [2025-07-10 11:59:54] WARN -- CNTI-Helm.helm_local_response.cmd: stderr: sh: line 0: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm: not found [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v2?: [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v3?: [2025-07-10 11:59:54] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 11:59:54] DEBUG -- CNTI-Helm.helm_gives_k8s_warning?.cmd: command: helm list Global kubectl found. Version: 1.32 No Local kubectl version found Global git found. Version: 2.45.3 No Local git version found All prerequisites found. KUBECONFIG is set as /home/xtesting/.kube/config. [2025-07-10 11:59:54] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-07-10 11:59:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 11:59:54] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite Created cnf-testsuite namespace on the Kubernetes cluster [2025-07-10 11:59:54] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace created [2025-07-10 11:59:54] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-07-10 11:59:55] INFO -- CNTI-Setup.configuration_file_setup: Creating configuration file [2025-07-10 11:59:55] DEBUG -- CNTI: install_apisnoop [2025-07-10 11:59:55] INFO -- CNTI: GitClient.clone command: https://github.com/cncf/apisnoop /home/xtesting/.cnf-testsuite/tools/apisnoop [2025-07-10 12:00:02] INFO -- CNTI: GitClient.clone output: [2025-07-10 12:00:02] INFO -- CNTI: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/apisnoop'... [2025-07-10 12:00:02] INFO -- CNTI: url: https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.56.14/sonobuoy_0.56.14_linux_amd64.tar.gz [2025-07-10 12:00:02] INFO -- CNTI: write_file: /home/xtesting/.cnf-testsuite/tools/sonobuoy/sonobuoy.tar.gz [2025-07-10 12:00:02] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:00:02] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:00:04] DEBUG -- CNTI: Sonobuoy Version: v0.56.14 MinimumKubeVersion: 1.17.0 MaximumKubeVersion: 1.99.99 GitSHA: bd5465d6b2b2b92b517f4c6074008d22338ff509 GoVersion: go1.19.4 Platform: linux/amd64 API Version check skipped due to missing `--kubeconfig` or other error [2025-07-10 12:00:04] INFO -- CNTI: install_kind [2025-07-10 12:00:04] INFO -- CNTI: write_file: /home/xtesting/.cnf-testsuite/tools/kind/kind [2025-07-10 12:00:04] INFO -- CNTI: install kind [2025-07-10 12:00:04] INFO -- CNTI: url: https://github.com/kubernetes-sigs/kind/releases/download/v0.27.0/kind-linux-amd64 [2025-07-10 12:00:04] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:00:04] DEBUG -- CNTI-http.client: Performing request Dependency installation complete 2025-07-10 12:00:25,002 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_install cnf-config=example-cnfs/coredns/cnf-testsuite.yml -l debug Successfully created directories for cnf-testsuite [2025-07-10 12:00:04] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-07-10 12:00:04] DEBUG -- CNTI: helm_local_install KUBECONFIG is set as /home/xtesting/.kube/config. [2025-07-10 12:00:05] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 12:00:05] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. [2025-07-10 12:00:05] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:00:05] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite cnf-testsuite namespace already exists on the Kubernetes cluster [2025-07-10 12:00:05] WARN -- CNTI-KubectlClient.Apply.namespace.cmd: stderr: Error from server (AlreadyExists): namespaces "cnf-testsuite" already exists [2025-07-10 12:00:05] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace already exists, not creating [2025-07-10 12:00:05] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-07-10 12:00:05] INFO -- CNTI-Setup.cnf_install: Installing CNF to cluster [2025-07-10 12:00:05] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:05] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:05] DEBUG -- CNTI: find output: [2025-07-10 12:00:05] WARN -- CNTI: find stderr: find: installed_cnf_files/*: No such file or directory [2025-07-10 12:00:05] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: [] [2025-07-10 12:00:05] INFO -- CNTI: ClusterTools install [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:00:05] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:00:05] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file cluster_tools.yml [2025-07-10 12:00:05] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": host namespaces (hostNetwork=true, hostPID=true), privileged (container "cluster-tools" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "cluster-tools" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "cluster-tools" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volumes "proc", "systemd", "hostfs" use restricted volume type "hostPath"), runAsNonRoot != true (pod or container "cluster-tools" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "cluster-tools" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:00:05] INFO -- CNTI: ClusterTools wait_for_cluster_tools [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:00:05] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:00:05] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Daemonset/cluster-tools to install [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-07-10 12:00:05] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-07-10 12:00:05] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-07-10 12:00:06] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-07-10 12:00:06] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-07-10 12:00:06] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-07-10 12:00:07] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-07-10 12:00:07] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-07-10 12:00:07] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools ClusterTools installed CNF installation start. Installing deployment "coredns". [2025-07-10 12:00:08] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Daemonset/cluster-tools is ready [2025-07-10 12:00:08] DEBUG -- CNTI-CNFInstall.parsed_cli_args: Parsed args: {config_path: "example-cnfs/coredns/cnf-testsuite.yml", timeout: 1800, skip_wait_for_install: false} [2025-07-10 12:00:08] INFO -- CNTI-Helm.helm_repo_add: Adding helm repository: stable [2025-07-10 12:00:08] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 12:00:08] DEBUG -- CNTI-Helm.helm_repo_add.cmd: command: helm repo add stable https://cncf.gitlab.io/stable [2025-07-10 12:00:08] INFO -- CNTI-Helm.pull: Pulling helm chart: stable/coredns [2025-07-10 12:00:08] DEBUG -- CNTI-Helm.pull.cmd: command: helm pull stable/coredns --untar --destination installed_cnf_files/deployments/coredns [2025-07-10 12:00:09] INFO -- CNTI-CNFManager.ensure_namespace_exists!: Ensure that namespace: cnf-default exists on the cluster for the CNF install [2025-07-10 12:00:09] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-default [2025-07-10 12:00:09] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-default with pod-security.kubernetes.io/enforce=privileged [2025-07-10 12:00:09] INFO -- CNTI-Helm.install: Installing helm chart: installed_cnf_files/deployments/coredns/coredns [2025-07-10 12:00:09] DEBUG -- CNTI-Helm.install: Values: [2025-07-10 12:00:09] DEBUG -- CNTI-Helm.install.cmd: command: helm install coredns installed_cnf_files/deployments/coredns/coredns -n cnf-default [2025-07-10 12:00:10] WARN -- CNTI-Helm.install.cmd: stderr: W0710 12:00:10.100866 482 warnings.go:70] spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead W0710 12:00:10.100919 482 warnings.go:70] would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:00:10] INFO -- CNTI-Helm.generate_manifest: Generating manifest from installed CNF: coredns [2025-07-10 12:00:10] DEBUG -- CNTI-Helm.cmd: command: helm get manifest coredns --namespace cnf-default [2025-07-10 12:00:10] INFO -- CNTI-Helm.generate_manifest: Manifest was generated successfully [2025-07-10 12:00:10] INFO -- CNTI-CNFInstall.add_namespace_to_resources: Updating metadata.namespace field for resources in generated manifest Waiting for resource for "coredns" deployment (1/1): [Deployment] coredns-coredns [2025-07-10 12:00:10] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: ConfigMap, name: coredns-coredns} [2025-07-10 12:00:10] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Service, name: coredns-coredns} [2025-07-10 12:00:10] DEBUG -- CNTI-CNFInstall.add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Deployment, name: coredns-coredns} [2025-07-10 12:00:10] DEBUG -- CNTI-CNFInstall.add_manifest_to_file: coredns manifest was appended into installed_cnf_files/deployments/coredns/deployment_manifest.yml file [2025-07-10 12:00:10] DEBUG -- CNTI-CNFInstall.add_manifest_to_file: coredns manifest was appended into installed_cnf_files/common_manifest.yml file [2025-07-10 12:00:10] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "ConfigMap", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "ClusterRole", name: "coredns-coredns", namespace: "default"}, {kind: "ClusterRoleBinding", name: "coredns-coredns", namespace: "default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:00:10] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Deployment/coredns-coredns to install [2025-07-10 12:00:10] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:10] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:10] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:10] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-07-10 12:00:11] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:11] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:11] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:12] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:12] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:12] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:13] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:13] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:14] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:14] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:14] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:15] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:15] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:15] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:17] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:17] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:18] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:18] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:18] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:19] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:19] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:19] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:20] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:20] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:21] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:21] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:21] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 10 [2025-07-10 12:00:22] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:22] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:23] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:23] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:24] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/coredns-coredns is ready [2025-07-10 12:00:24] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/coredns-coredns [2025-07-10 12:00:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns All "coredns" deployment resources are up. CNF installation complete. [2025-07-10 12:00:25] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Deployment/coredns-coredns is ready [2025-07-10 12:00:25] INFO -- CNTI-Setup.cnf_install: CNF installed successfuly 2025-07-10 12:14:52,779 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite workload -l debug [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" Successfully created directories for cnf-testsuite [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:25] INFO -- CNTI-Setup.configuration_file_setup: Creating configuration file [2025-07-10 12:00:25] INFO -- CNTI-Setup.cnf_directory_setup: Creating directories for CNTI testsuite [2025-07-10 12:00:25] DEBUG -- CNTI: helm_local_install [2025-07-10 12:00:25] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 12:00:25] INFO -- CNTI: Globally installed helm satisfies required version. Skipping local helm install. [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.Results.file: Results file created: results/cnf-testsuite-results-20250710-120025-089.yml [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_chart_valid] [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.task_runner.helm_chart_valid: Starting test [2025-07-10 12:00:25] DEBUG -- CNTI: helm_v3?: BuildInfo{Version:"v3.17.0", GitCommit:"301108edc7ac2a8ba79e4ebf5701b0b6ce6a31e4", GitTreeState:"clean", GoVersion:"go1.23.4" [2025-07-10 12:00:25] INFO -- CNTI: Current directory: /src/cnf-testsuite [2025-07-10 12:00:25] INFO -- CNTI-helm_chart_valid: Linting helm chart for deployment: coredns [2025-07-10 12:00:25] INFO -- CNTI-helm_chart_valid: Helm lint command: helm lint /src/cnf-testsuite/installed_cnf_files/deployments/coredns/coredns ✔️ PASSED: [helm_chart_valid] Helm chart lint passed on all charts ⎈📝☑ [2025-07-10 12:00:25] INFO -- CNTI-helm_chart_valid: Helm Lint output: ==> Linting /src/cnf-testsuite/installed_cnf_files/deployments/coredns/coredns 1 chart(s) linted, 0 chart(s) failed [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_chart_valid' emoji: ⎈📝☑ [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_valid' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_valid' type: normal [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_valid' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_valid' type: normal [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_chart_valid: Task start time: 2025-07-10 12:00:25 UTC, end time: 2025-07-10 12:00:25 UTC [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.upsert_task-helm_chart_valid: Task: 'helm_chart_valid' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.178735826 [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_chart_published] [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.task_runner.helm_chart_published: Starting test ✔️ PASSED: [helm_chart_published] All Helm charts are published ⎈📦🌐 [2025-07-10 12:00:25] INFO -- CNTI-helm_chart_published: Searching Helm chart: stable/coredns [2025-07-10 12:00:25] INFO -- CNTI-helm_chart_published: Helm search output: NAME CHART VERSION APP VERSION DESCRIPTION stable/coredns 1.13.8 1.7.1 CoreDNS is a DNS server that chains plugins and... [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_chart_published' emoji: ⎈📦🌐 [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_published' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_published' type: normal [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_chart_published' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_chart_published' type: normal [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_chart_published: Task start time: 2025-07-10 12:00:25 UTC, end time: 2025-07-10 12:00:25 UTC [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.upsert_task-helm_chart_published: Task: 'helm_chart_published' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.087347161 [2025-07-10 12:00:25] DEBUG -- CNTI-helm_deploy: helm_deploy args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [helm_deploy] ✔️ PASSED: [helm_deploy] CNF is installed via helm ⚙🛠️⬆☁ [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.task_runner.helm_deploy: Starting test [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] DEBUG -- CNTI: all cnf: installed_cnf_files [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: installed_cnf_files [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'helm_deploy' emoji: ⚙🛠️⬆☁ [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_deploy' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_deploy' type: normal [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'helm_deploy' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'helm_deploy' type: normal [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-helm_deploy: Task start time: 2025-07-10 12:00:25 UTC, end time: 2025-07-10 12:00:25 UTC [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.upsert_task-helm_deploy: Task: 'helm_deploy' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.016477093 [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [cni_compatible] ⏭️ SKIPPED: [cni_compatible] cni_compatible test was temporarily disabled, check #2153 🔓🔑 [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.task_runner.cni_compatible: Starting test [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'cni_compatible' emoji: 🔓🔑 [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cni_compatible' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'cni_compatible' type: [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 0 points [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cni_compatible' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points: Task: 'cni_compatible' type: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-cni_compatible: Task start time: 2025-07-10 12:00:25 UTC, end time: 2025-07-10 12:00:25 UTC [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Points.upsert_task-cni_compatible: Task: 'cni_compatible' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.015250783 [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [increase_decrease_capacity] [2025-07-10 12:00:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:25] INFO -- CNTI-CNFManager.Task.task_runner.increase_decrease_capacity: Starting test [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:00:25] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:25] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:00:25] INFO -- CNTI-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default [2025-07-10 12:00:25] INFO -- CNTI-change_capacity:capacity: Base replicas: 1; Target replicas: 3 [2025-07-10 12:00:25] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 1 replicas [2025-07-10 12:00:25] DEBUG -- CNTI: target_replica_count: 1 [2025-07-10 12:00:25] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:25] DEBUG -- CNTI: Deployment initialized to 1 [2025-07-10 12:00:25] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 3 replicas [2025-07-10 12:00:25] WARN -- CNTI-KubectlClient.Utils.scale.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead [2025-07-10 12:00:25] DEBUG -- CNTI: target_replica_count: 3 [2025-07-10 12:00:25] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:28] DEBUG -- CNTI: Time left: 58 seconds [2025-07-10 12:00:28] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:30] DEBUG -- CNTI: Time left: 56 seconds [2025-07-10 12:00:30] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:32] DEBUG -- CNTI: Time left: 54 seconds [2025-07-10 12:00:32] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:34] DEBUG -- CNTI: Time left: 52 seconds [2025-07-10 12:00:34] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:36] DEBUG -- CNTI: Time left: 50 seconds [2025-07-10 12:00:36] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:38] DEBUG -- CNTI: Time left: 48 seconds [2025-07-10 12:00:38] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:40] DEBUG -- CNTI: Time left: 46 seconds [2025-07-10 12:00:40] DEBUG -- CNTI: current_replicas before get Deployment: 1 [2025-07-10 12:00:42] DEBUG -- CNTI: Time left: 58 seconds [2025-07-10 12:00:42] DEBUG -- CNTI: current_replicas before get Deployment: 3 [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:00:43] INFO -- CNTI-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default [2025-07-10 12:00:43] INFO -- CNTI-change_capacity:capacity: Base replicas: 3; Target replicas: 1 [2025-07-10 12:00:43] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 3 replicas [2025-07-10 12:00:43] DEBUG -- CNTI: target_replica_count: 3 [2025-07-10 12:00:43] DEBUG -- CNTI: current_replicas before get Deployment: 3 [2025-07-10 12:00:43] DEBUG -- CNTI: Deployment initialized to 3 [2025-07-10 12:00:43] INFO -- CNTI-KubectlClient.Utils.scale: Scale Deployment/coredns-coredns to 1 replicas [2025-07-10 12:00:43] WARN -- CNTI-KubectlClient.Utils.scale.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead [2025-07-10 12:00:43] DEBUG -- CNTI: target_replica_count: 1 [2025-07-10 12:00:43] DEBUG -- CNTI: current_replicas before get Deployment: 1 ✔️ 🏆PASSED: [increase_decrease_capacity] Replicas increased to 3 and decreased to 1 📦📈📉 [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'increase_decrease_capacity' emoji: 📦📈📉 [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'increase_decrease_capacity' tags: ["compatibility", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points: Task: 'increase_decrease_capacity' type: essential [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'increase_decrease_capacity' tags: ["compatibility", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points: Task: 'increase_decrease_capacity' type: essential [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Points.upsert_task-increase_decrease_capacity: Task start time: 2025-07-10 12:00:25 UTC, end time: 2025-07-10 12:00:43 UTC [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.Points.upsert_task-increase_decrease_capacity: Task: 'increase_decrease_capacity' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:18.237029896 [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:43] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:43] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:43] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rollback] [2025-07-10 12:00:43] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.Task.task_runner.rollback: Starting test [2025-07-10 12:00:43] DEBUG -- CNTI-rollback: container_names: [#] [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:00:43] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:00:43] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:00:43] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:00:43] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:00:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:43] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:00:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:43] DEBUG -- CNTI-rollback: Rollback: setting new version; resource=Deployment/coredns-coredns; container_name=coredns; image_name=coredns/coredns; image_tag: 1.7.1 [2025-07-10 12:00:43] DEBUG -- CNTI-rollback: rollback: update Deployment/coredns-coredns, container: coredns, image: coredns/coredns, tag: 1.8.0 [2025-07-10 12:00:43] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-07-10 12:00:43] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:00:43] INFO -- CNTI-rollback: rollback version change successful? true [2025-07-10 12:00:43] DEBUG -- CNTI-rollback: rollback: checking status new version [2025-07-10 12:00:43] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-rollback: rollback: rolling back to old version [2025-07-10 12:00:58] INFO -- CNTI-KubectlClient.Rollout.undo: Undo rollout of Deployment/coredns-coredns ✔️ PASSED: [rollback] CNF Rollback Passed  [2025-07-10 12:00:58] WARN -- CNTI-KubectlClient.Rollout.undo.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rollback' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points: Task: 'rollback' type: normal [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rollback' tags: ["compatibility", "dynamic", "workload", "normal"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points: Task: 'rollback' type: normal [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-rollback: Task start time: 2025-07-10 12:00:43 UTC, end time: 2025-07-10 12:00:58 UTC [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Points.upsert_task-rollback: Task: 'rollback' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:14.656249347 [2025-07-10 12:00:58] INFO -- CNTI-Workload.deprecated_k8s_features: Testing CNF for usage of deprecated Kubernetes features [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:58] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:58] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [deprecated_k8s_features] ✔️ PASSED: [deprecated_k8s_features] CNF does not use deprecated K8s features  [2025-07-10 12:00:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Task.task_runner.deprecated_k8s_features: Starting test [2025-07-10 12:00:58] INFO -- CNTI-Workload.deprecated_k8s_features: Found 0 deprecated feature warnings [2025-07-10 12:00:58] INFO -- CNTI-Workload.deprecated_k8s_features: CNF does not use any deprecated features [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'deprecated_k8s_features' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points: Task: 'deprecated_k8s_features' type: [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'deprecated_k8s_features' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points: Task: 'deprecated_k8s_features' type: [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-deprecated_k8s_features: Task start time: 2025-07-10 12:00:58 UTC, end time: 2025-07-10 12:00:58 UTC [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Points.upsert_task-deprecated_k8s_features: Task: 'deprecated_k8s_features' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.016081652 [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:00:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:00:58] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:00:58] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:00:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_update] [2025-07-10 12:00:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.Task.task_runner.rolling_update: Starting test [2025-07-10 12:00:58] DEBUG -- CNTI-rolling_update: container_names: [#] [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:00:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:00:58] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:00:58] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:00:58] DEBUG -- CNTI-rolling_update: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-07-10 12:00:58] DEBUG -- CNTI-rolling_update: container_names: [#] [2025-07-10 12:00:58] DEBUG -- CNTI: config_container: # [2025-07-10 12:00:58] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-07-10 12:00:58] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:00:58] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_update] CNF for Rolling Update Passed  [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_update' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_update' type: [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_update' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_update' type: [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_update: Task start time: 2025-07-10 12:00:58 UTC, end time: 2025-07-10 12:01:13 UTC [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_update: Task: 'rolling_update' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:14.802248058 [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:13] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:13] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:13] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:13] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:13] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_downgrade] [2025-07-10 12:01:13] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.Task.task_runner.rolling_downgrade: Starting test [2025-07-10 12:01:13] DEBUG -- CNTI-rolling_downgrade: container_names: [#] [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:01:13] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:01:13] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:13] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:01:13] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:01:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:13] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:01:13] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:13] DEBUG -- CNTI-rolling_downgrade: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-07-10 12:01:13] DEBUG -- CNTI-rolling_downgrade: container_names: [#] [2025-07-10 12:01:13] DEBUG -- CNTI: config_container: # [2025-07-10 12:01:13] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-07-10 12:01:13] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:01:13] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_downgrade] CNF for Rolling Downgrade Passed  [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_downgrade' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_downgrade' type: [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_downgrade' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_downgrade' type: [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_downgrade: Task start time: 2025-07-10 12:01:13 UTC, end time: 2025-07-10 12:01:27 UTC [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_downgrade: Task: 'rolling_downgrade' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:14.094240570 [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:27] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:27] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:27] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:27] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:27] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [rolling_version_change] [2025-07-10 12:01:27] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.Task.task_runner.rolling_version_change: Starting test [2025-07-10 12:01:27] DEBUG -- CNTI-rolling_version_change: container_names: [#] [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:01:27] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:01:27] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:27] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:01:27] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:01:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:27] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:01:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:27] DEBUG -- CNTI-rolling_version_change: container: {"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.6.7", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]} [2025-07-10 12:01:27] DEBUG -- CNTI-rolling_version_change: container_names: [#] [2025-07-10 12:01:27] DEBUG -- CNTI: config_container: # [2025-07-10 12:01:27] INFO -- CNTI-KubectlClient.Utils.set_image: Set image of container Deployment/coredns-coredns/coredns to coredns/coredns [2025-07-10 12:01:27] WARN -- CNTI-KubectlClient.Utils.set_image.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:01:27] INFO -- CNTI-KubectlClient.Rollout.status: Get rollout status of Deployment/coredns-coredns ✔️ PASSED: [rolling_version_change] CNF for Rolling Version Change Passed  Compatibility, installability, and upgradeability results: 9 of 10 tests passed  [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_version_change' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_version_change' type: [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'rolling_version_change' tags: ["compatibility", "dynamic", "workload"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'rolling_version_change' type: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.upsert_task-rolling_version_change: Task start time: 2025-07-10 12:01:27 UTC, end time: 2025-07-10 12:01:42 UTC [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.upsert_task-rolling_version_change: Task: 'rolling_version_change' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:15.036624399 [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tags: ["compatibility"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 140, total tasks passed: 9 for tags: ["compatibility"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 145, max tasks passed: 10 for tags: ["compatibility"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tags: ["compatibility"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 140, total tasks passed: 9 for tags: ["compatibility"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["cni_compatible", "increase_decrease_capacity", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "helm_deploy", "helm_chart_valid", "helm_chart_published"] for tag: compatibility [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 145, max tasks passed: 10 for tags: ["compatibility"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["essential"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: [] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 100 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1900, max tasks passed: 19 for tags: ["essential"] [2025-07-10 12:01:42] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => nil, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:01:42] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:01:42] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:01:42] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}], "maximum_points" => 145} [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [no_local_volume_configuration] Rescued: On resource coredns-coredns of kind Service, local storage configuration volumes not found ✔️ ✨PASSED: [no_local_volume_configuration] local storage configuration volumes not found 🖥️ 💾 [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.task_runner.no_local_volume_configuration: Starting test [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:01:42] DEBUG -- CNTI-no_local_volume_configuration: volumes: [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}] [2025-07-10 12:01:42] DEBUG -- CNTI-no_local_volume_configuration: persistent volume claim names: [] [2025-07-10 12:01:42] ERROR -- CNTI-no_local_volume_configuration: Missing hash key: "template" [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'no_local_volume_configuration' emoji: 💾 [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'no_local_volume_configuration' tags: ["state", "dynamic", "workload", "bonus"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'no_local_volume_configuration' type: bonus [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'no_local_volume_configuration' tags: ["state", "dynamic", "workload", "bonus"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'no_local_volume_configuration' type: bonus [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.upsert_task-no_local_volume_configuration: Task start time: 2025-07-10 12:01:42 UTC, end time: 2025-07-10 12:01:42 UTC [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.upsert_task-no_local_volume_configuration: Task: 'no_local_volume_configuration' has status: 'passed' and is awarded: 1 points.Runtime: 00:00:00.016340980 [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [elastic_volumes] [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.task_runner.elastic_volumes: Starting test [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:01:42] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:test_resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✖️ ✨FAILED: [elastic_volumes] Some of the used volumes are not elastic 🧫 [2025-07-10 12:01:42] INFO -- CNTI: workloadresource elastic? [2025-07-10 12:01:42] INFO -- CNTI: vct_resource?? [2025-07-10 12:01:42] INFO -- CNTI: vct_resource? resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "6", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "generation" => 8, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4609760", "uid" => "b4b807ce-b3a0-4bf5-af5e-d8036d3bf178"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-07-10T12:00:40Z", "lastUpdateTime" => "2025-07-10T12:00:40Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}, {"lastTransitionTime" => "2025-07-10T12:00:10Z", "lastUpdateTime" => "2025-07-10T12:01:42Z", "message" => "ReplicaSet \"coredns-coredns-56898dd654\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}], "observedGeneration" => 8, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} [2025-07-10 12:01:42] INFO -- CNTI: vct_resource? vct: [2025-07-10 12:01:42] INFO -- CNTI: Volume.elastic_by_volumes [2025-07-10 12:01:42] INFO -- CNTI: storage_class_by_volumes? [2025-07-10 12:01:42] INFO -- CNTI: storage_class_by_volumes? volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-07-10 12:01:42] INFO -- CNTI: volume_claims [] [2025-07-10 12:01:42] INFO -- CNTI: storage_class_names: [] [2025-07-10 12:01:42] INFO -- CNTI: StorageClass.elastic_by_storage_class [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:storage_class_names: [] [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:provisioners: [] [2025-07-10 12:01:42] INFO -- CNTI: Provisioners: [] [2025-07-10 12:01:42] INFO -- CNTI: elastic? false [2025-07-10 12:01:42] INFO -- CNTI: Volume.elastic_by_volumes elastic: false [2025-07-10 12:01:42] INFO -- CNTI: workloadresource elastic?: false [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:elastic_result: false [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:01:42] INFO -- CNTI-elastic_volumes:result: Volumes used: true; Elastic?: false [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'elastic_volumes' emoji: 🧫 [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'elastic_volumes' tags: ["state", "dynamic", "workload", "bonus"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'elastic_volumes' type: bonus [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.task_points: Task: elastic_volumes is worth: 0 points [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'elastic_volumes' tags: ["state", "dynamic", "workload", "bonus"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points: Task: 'elastic_volumes' type: bonus [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Points.upsert_task-elastic_volumes: Task start time: 2025-07-10 12:01:42 UTC, end time: 2025-07-10 12:01:42 UTC [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Points.upsert_task-elastic_volumes: Task: 'elastic_volumes' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.325747365 [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:42] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:42] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [database_persistence] [2025-07-10 12:01:42] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:42] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:42] INFO -- CNTI-CNFManager.Task.task_runner.database_persistence: Starting test [2025-07-10 12:01:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ SKIPPED: [database_persistence] CNF does not use database 🧫 [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name image_name: mysql/mysql-server [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name image_name: bitnami/mysql [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:01:43] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:01:43] INFO -- CNTI: database_persistence mysql: [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'database_persistence' emoji: 🧫 [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'database_persistence' tags: ["state", "dynamic", "workload"] [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points: Task: 'database_persistence' type: [2025-07-10 12:01:43] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 0 points [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'database_persistence' tags: ["state", "dynamic", "workload"] [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points: Task: 'database_persistence' type: [2025-07-10 12:01:43] DEBUG -- CNTI-CNFManager.Points.upsert_task-database_persistence: Task start time: 2025-07-10 12:01:42 UTC, end time: 2025-07-10 12:01:43 UTC [2025-07-10 12:01:43] INFO -- CNTI-CNFManager.Points.upsert_task-database_persistence: Task: 'database_persistence' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.154131314 [2025-07-10 12:01:43] INFO -- CNTI: install litmus [2025-07-10 12:01:43] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: litmus [2025-07-10 12:01:43] INFO -- CNTI-Label.namespace: command: kubectl label namespace litmus pod-security.kubernetes.io/enforce=privileged [2025-07-10 12:01:43] DEBUG -- CNTI-Label.namespace: output: namespace/litmus labeled [2025-07-10 12:01:43] INFO -- CNTI: install litmus operator [2025-07-10 12:01:43] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file https://litmuschaos.github.io/litmus/litmus-operator-v3.6.0.yaml [2025-07-10 12:01:44] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: resource namespaces/litmus is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "chaos-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "chaos-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "chaos-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "chaos-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:01:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:01:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:01:44] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:01:44] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:01:44] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:01:44] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [node_drain] [2025-07-10 12:01:44] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:01:44] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.Task.task_runner.node_drain: Starting test [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:01:44] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:01:44] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:01:44] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:01:44] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:44] INFO -- CNTI: Current Resource Name: Deployment/coredns-coredns Namespace: cnf-default [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:01:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:01:45] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:01:45] INFO -- CNTI: Getting the operator node name: kubectl get pods -l app.kubernetes.io/instance=coredns -n cnf-default -o=jsonpath='{.items[0].spec.nodeName}' [2025-07-10 12:01:45] DEBUG -- CNTI: status_code: 0 [2025-07-10 12:01:45] INFO -- CNTI: Found node to cordon v132-worker using label app.kubernetes.io/instance='coredns' in cnf-default namespace. [2025-07-10 12:01:45] INFO -- CNTI-KubectlClient.Utils.cordon: Cordon node v132-worker [2025-07-10 12:01:45] INFO -- CNTI: Cordoned node v132-worker successfully. [2025-07-10 12:01:45] DEBUG -- CNTI-node_drain: Getting the app node name kubectl get pods -l app.kubernetes.io/instance=coredns -n cnf-default -o=jsonpath='{.items[0].spec.nodeName}' [2025-07-10 12:01:46] DEBUG -- CNTI-node_drain: status_code: 0 [2025-07-10 12:01:46] DEBUG -- CNTI-node_drain: Getting the app node name kubectl get pods -n litmus -l app.kubernetes.io/name=litmus -o=jsonpath='{.items[0].spec.nodeName}' [2025-07-10 12:01:46] DEBUG -- CNTI-node_drain: status_code: 0 [2025-07-10 12:01:46] INFO -- CNTI: Workload Node Name: v132-worker [2025-07-10 12:01:46] INFO -- CNTI: Litmus Node Name: v132-worker [2025-07-10 12:01:46] INFO -- CNTI: Litmus and the workload are scheduled to the same node. Re-scheduling Litmus [2025-07-10 12:01:46] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:01:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:01:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:01:47] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker2 [2025-07-10 12:01:47] INFO -- CNTI: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} [2025-07-10 12:01:47] DEBUG -- CNTI: NodeName: v132-worker2 [2025-07-10 12:01:47] INFO -- CNTI: All Schedulable Nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:24:41Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4609420", "uid" => "b377898c-d4a3-429a-a07e-e94ef699bfcf"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-07-10T12:00:28Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:00:28Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:00:28Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:00:28Z", "lastTransitionTime" => "2025-06-10T13:24:57Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:17aa5b215f2b70bc0e456a87bcdd93e8774f133c73452df69d89606abc555270", "docker.io/library/docker:dind"], "sizeBytes" => 144084273}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.32.5", "registry.k8s.io/kube-apiserver:v1.32.5"], "sizeBytes" => 98089457}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.32.5", "registry.k8s.io/kube-proxy:v1.32.5"], "sizeBytes" => 95322311}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.32.5", "registry.k8s.io/kube-controller-manager:v1.32.5"], "sizeBytes" => 90814807}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.32.5", "registry.k8s.io/kube-scheduler:v1.32.5"], "sizeBytes" => 70670679}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:2a0b297cc7c4cd376ac7413df339ff2fdaa1ec9d099aed92b5ea1f031ef7f639", "registry.k8s.io/sig-storage/csi-resizer:v1.13.1"], "sizeBytes" => 32400950}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:a399393ff5bd156277c56bae0c08389b1a1b95b7fd6ea44a316ce55e0dd559d7", "registry.k8s.io/sig-storage/csi-attacher:v4.8.0"], "sizeBytes" => 32231444}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:d7138bcc3aa5f267403d45ad4292c95397e421ea17a0035888850f424c7de25d", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0"], "sizeBytes" => 14781503}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.5", "kubeletVersion" => "v1.32.5", "machineID" => "1c8518f767534ccbb984eba50ce31326", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "908f18f5-d9b2-4601-92f3-9e4f7f539dda"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}] [2025-07-10 12:01:47] INFO -- CNTI: Schedulable Node Names: ["v132-worker2"] [2025-07-10 12:01:47] INFO -- CNTI: Schedulable Litmus Nodes: ["v132-worker2"] [2025-07-10 12:01:47] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:01:47] INFO -- CNTI: Re-Schedule Litmus [2025-07-10 12:01:47] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file litmus-operator-modified.yaml [2025-07-10 12:01:48] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "chaos-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "chaos-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "chaos-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "chaos-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:01:48] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Deployment/chaos-operator-ce to install [2025-07-10 12:01:48] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/chaos-operator-ce is ready [2025-07-10 12:01:48] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/chaos-operator-ce [2025-07-10 12:01:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/chaos-operator-ce [2025-07-10 12:01:49] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-07-10 12:01:50] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/chaos-operator-ce is ready [2025-07-10 12:01:50] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/chaos-operator-ce [2025-07-10 12:01:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/chaos-operator-ce [2025-07-10 12:01:51] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Deployment/chaos-operator-ce is ready [2025-07-10 12:01:51] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Deployment/chaos-operator-ce [2025-07-10 12:01:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/chaos-operator-ce [2025-07-10 12:01:51] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Deployment/chaos-operator-ce is ready [2025-07-10 12:01:51] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/node-drain/fault.yaml, node_drain_experiment.yaml [2025-07-10 12:01:51] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:01:51] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml [2025-07-10 12:01:51] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:01:51] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml [2025-07-10 12:01:51] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/node-drain/rbac.yaml, node_drain_rbac.yaml [2025-07-10 12:01:51] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:01:51] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml [2025-07-10 12:01:51] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:01:51] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml [2025-07-10 12:01:52] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:01:52] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:01:52] INFO -- CNTI-node_drain: Chaos test name: coredns-coredns-ff820174; Experiment name: node-drain; Label app.kubernetes.io/instance=coredns; namespace: cnf-default [2025-07-10 12:01:52] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/node-drain-chaosengine.yml [2025-07-10 12:01:52] INFO -- CNTI: wait_for_test: coredns-coredns-ff820174-node-drain [2025-07-10 12:01:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:01:52] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:01:54] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:01:54] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:01:54] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:01:56] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:01:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:01:56] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:01:58] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:01:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:01:58] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:00] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:02:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:01] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:03] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:02:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:03] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:05] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:02:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:05] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:07] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:02:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:07] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:09] DEBUG -- CNTI: Time left: 1784 seconds [2025-07-10 12:02:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:09] INFO -- CNTI: status_code: 0, response: [2025-07-10 12:02:11] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:02:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:11] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:13] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:02:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:13] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:15] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:02:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:15] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:17] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:02:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:18] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:20] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:02:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:20] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:22] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:02:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:22] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:24] DEBUG -- CNTI: Time left: 1769 seconds [2025-07-10 12:02:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:24] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:26] DEBUG -- CNTI: Time left: 1767 seconds [2025-07-10 12:02:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:26] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:28] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:02:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:28] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:30] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:02:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:32] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:02:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:34] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:02:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:36] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:02:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:37] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:39] DEBUG -- CNTI: Time left: 1754 seconds [2025-07-10 12:02:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:39] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:41] DEBUG -- CNTI: Time left: 1752 seconds [2025-07-10 12:02:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:41] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:43] DEBUG -- CNTI: Time left: 1750 seconds [2025-07-10 12:02:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:43] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:45] DEBUG -- CNTI: Time left: 1748 seconds [2025-07-10 12:02:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:45] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:47] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:02:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:47] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:49] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:02:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:51] DEBUG -- CNTI: Time left: 1741 seconds [2025-07-10 12:02:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:53] DEBUG -- CNTI: Time left: 1739 seconds [2025-07-10 12:02:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:54] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:56] DEBUG -- CNTI: Time left: 1737 seconds [2025-07-10 12:02:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:56] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:02:58] DEBUG -- CNTI: Time left: 1735 seconds [2025-07-10 12:02:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:02:58] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:00] DEBUG -- CNTI: Time left: 1733 seconds [2025-07-10 12:03:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:00] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:02] DEBUG -- CNTI: Time left: 1731 seconds [2025-07-10 12:03:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:04] DEBUG -- CNTI: Time left: 1729 seconds [2025-07-10 12:03:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:06] DEBUG -- CNTI: Time left: 1726 seconds [2025-07-10 12:03:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:08] DEBUG -- CNTI: Time left: 1724 seconds [2025-07-10 12:03:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:10] DEBUG -- CNTI: Time left: 1722 seconds [2025-07-10 12:03:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:12] DEBUG -- CNTI: Time left: 1720 seconds [2025-07-10 12:03:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:13] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:15] DEBUG -- CNTI: Time left: 1718 seconds [2025-07-10 12:03:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:15] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:17] DEBUG -- CNTI: Time left: 1716 seconds [2025-07-10 12:03:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:17] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:19] DEBUG -- CNTI: Time left: 1714 seconds [2025-07-10 12:03:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:21] DEBUG -- CNTI: Time left: 1712 seconds [2025-07-10 12:03:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:23] DEBUG -- CNTI: Time left: 1709 seconds [2025-07-10 12:03:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:25] DEBUG -- CNTI: Time left: 1707 seconds [2025-07-10 12:03:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:27] DEBUG -- CNTI: Time left: 1705 seconds [2025-07-10 12:03:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:29] DEBUG -- CNTI: Time left: 1703 seconds [2025-07-10 12:03:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:32] DEBUG -- CNTI: Time left: 1701 seconds [2025-07-10 12:03:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:34] DEBUG -- CNTI: Time left: 1699 seconds [2025-07-10 12:03:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:36] DEBUG -- CNTI: Time left: 1697 seconds [2025-07-10 12:03:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:38] DEBUG -- CNTI: Time left: 1695 seconds [2025-07-10 12:03:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:40] DEBUG -- CNTI: Time left: 1692 seconds [2025-07-10 12:03:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:42] DEBUG -- CNTI: Time left: 1690 seconds [2025-07-10 12:03:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:44] DEBUG -- CNTI: Time left: 1688 seconds [2025-07-10 12:03:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:46] DEBUG -- CNTI: Time left: 1686 seconds [2025-07-10 12:03:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:46] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:48] DEBUG -- CNTI: Time left: 1684 seconds [2025-07-10 12:03:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:51] DEBUG -- CNTI: Time left: 1682 seconds [2025-07-10 12:03:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:53] DEBUG -- CNTI: Time left: 1680 seconds [2025-07-10 12:03:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:55] DEBUG -- CNTI: Time left: 1678 seconds [2025-07-10 12:03:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:57] DEBUG -- CNTI: Time left: 1676 seconds [2025-07-10 12:03:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:03:59] DEBUG -- CNTI: Time left: 1673 seconds [2025-07-10 12:03:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:03:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:01] DEBUG -- CNTI: Time left: 1671 seconds [2025-07-10 12:04:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:01] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:03] DEBUG -- CNTI: Time left: 1669 seconds [2025-07-10 12:04:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:03] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:05] DEBUG -- CNTI: Time left: 1667 seconds [2025-07-10 12:04:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:08] DEBUG -- CNTI: Time left: 1665 seconds [2025-07-10 12:04:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:10] DEBUG -- CNTI: Time left: 1663 seconds [2025-07-10 12:04:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:12] DEBUG -- CNTI: Time left: 1661 seconds [2025-07-10 12:04:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:14] DEBUG -- CNTI: Time left: 1659 seconds [2025-07-10 12:04:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:16] DEBUG -- CNTI: Time left: 1656 seconds [2025-07-10 12:04:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:16] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:18] DEBUG -- CNTI: Time left: 1654 seconds [2025-07-10 12:04:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:18] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:04:20] DEBUG -- CNTI: Time left: 1652 seconds [2025-07-10 12:04:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-ff820174 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:04:20] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:04:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-ff820174-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:04:21] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:04:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-ff820174-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:04:21] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:04:21] INFO -- CNTI-KubectlClient.Utils.uncordon: Uncordon node v132-worker ✔️ 🏆PASSED: [node_drain] node_drain chaos test passed 🗡️💀♻ State results: 2 of 3 tests passed  [2025-07-10 12:04:21] INFO -- CNTI: Uncordoned node v132-worker successfully. [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'node_drain' emoji: 🗡️💀♻ [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'node_drain' tags: ["state", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points: Task: 'node_drain' type: essential [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'node_drain' tags: ["state", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points: Task: 'node_drain' type: essential [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.upsert_task-node_drain: Task start time: 2025-07-10 12:01:44 UTC, end time: 2025-07-10 12:04:21 UTC [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.upsert_task-node_drain: Task: 'node_drain' has status: 'passed' and is awarded: 100 points.Runtime: 00:02:37.081770039 [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tags: ["state"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 101, total tasks passed: 2 for tags: ["state"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 106, max tasks passed: 3 for tags: ["state"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tags: ["state"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 101, total tasks passed: 2 for tags: ["state"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain"] for tag: state [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 106, max tasks passed: 3 for tags: ["state"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 200, total tasks passed: 2 for tags: ["essential"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes"] [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 100 points [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:04:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1900, max tasks passed: 19 for tags: ["essential"] [2025-07-10 12:04:21] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 140, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:04:21] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:04:21] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:04:21] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 106} [2025-07-10 12:04:21] INFO -- CNTI-Setup.kubescape_framework_download: Downloading Kubescape testing framework [2025-07-10 12:04:21] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:21] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:22] DEBUG -- CNTI-Setup.kubescape_framework_download: Downloaded Kubescape framework json [2025-07-10 12:04:22] INFO -- CNTI-Setup.kubescape_framework_download: Kubescape framework json has been downloaded [2025-07-10 12:04:22] INFO -- CNTI-Setup.install_kubescape: Installing Kubescape tool [2025-07-10 12:04:22] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:22] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:25] DEBUG -- CNTI-Setup.install_kubescape: Downloaded Kubescape binary [2025-07-10 12:04:25] INFO -- CNTI-ShellCmd.run: command: chmod +x /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape [2025-07-10 12:04:25] DEBUG -- CNTI-ShellCmd.run: output: [2025-07-10 12:04:25] INFO -- CNTI-Setup.install_kubescape: Kubescape tool has been installed [2025-07-10 12:04:25] INFO -- CNTI-Setup.kubescape_scan: Perform Kubescape cluster scan [2025-07-10 12:04:25] INFO -- CNTI: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan framework nsa --use-from /home/xtesting/.cnf-testsuite/tools/kubescape/nsa.json --output kubescape_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite [2025-07-10 12:04:33] INFO -- CNTI: output: ────────────────────────────────────────────────── Framework scanned: NSA ┌─────────────────┬────┐ │ Controls │ 25 │ │ Passed │ 11 │ │ Failed │ 9 │ │ Action Required │ 5 │ └─────────────────┴────┘ Failed resources by severity: ┌──────────┬────┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 11 │ │ Low │ 1 │ └──────────┴────┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬────────────────────────────────────────────────────┬──────────────────┬───────────────┬────────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ Critical │ Disable anonymous access to Kubelet service │ 0 │ 0 │ Action Required ** │ │ Critical │ Enforce Kubelet client TLS authentication │ 0 │ 0 │ Action Required ** │ │ Medium │ Prevent containers from allowing command execution │ 2 │ 23 │ 91% │ │ Medium │ Non-root containers │ 1 │ 1 │ 0% │ │ Medium │ Allow privilege escalation │ 1 │ 1 │ 0% │ │ Medium │ Ingress and Egress blocked │ 1 │ 1 │ 0% │ │ Medium │ Automatic mapping of service account │ 3 │ 4 │ 25% │ │ Medium │ Administrative Roles │ 1 │ 23 │ 96% │ │ Medium │ Cluster internal networking │ 1 │ 2 │ 50% │ │ Medium │ Linux hardening │ 1 │ 1 │ 0% │ │ Medium │ Secret/etcd encryption enabled │ 0 │ 0 │ Action Required * │ │ Medium │ Audit logs enabled │ 0 │ 0 │ Action Required * │ │ Low │ Immutable container filesystem │ 1 │ 1 │ 0% │ │ Low │ PSP enabled │ 0 │ 0 │ Action Required * │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ │ Resource Summary │ 6 │ 33 │ 54.48% │ └──────────┴────────────────────────────────────────────────────┴──────────────────┴───────────────┴────────────────────┘ 🚨 * failed to get cloud provider, cluster: kind-v132 🚨 ** This control is scanned exclusively by the Kubescape operator, not the Kubescape CLI. Install the Kubescape operator: https://kubescape.io/docs/install-operator/. [2025-07-10 12:04:33] INFO -- CNTI: stderr: {"level":"info","ts":"2025-07-10T12:04:25Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-07-10T12:04:27Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loading policies..."} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loaded policies"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-07-10T12:04:32Z","msg":"Scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-07-10T12:04:33Z","msg":"Done scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-07-10T12:04:33Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-07-10T12:04:33Z","msg":"Scan results saved","filename":"kubescape_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 54 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [symlink_file_system] ✔️ PASSED: [symlink_file_system] No containers allow a symlink attack 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.symlink_file_system: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'symlink_file_system' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'symlink_file_system' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'symlink_file_system' type: normal [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'symlink_file_system' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'symlink_file_system' type: normal [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-symlink_file_system: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-symlink_file_system: Task: 'symlink_file_system' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.044965212 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [privilege_escalation] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: If your application does not need it, make sure the allowPrivilegeEscalation field of the securityContext is set to false. ✖️ FAILED: [privilege_escalation] Found containers that allow privilege escalation 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.privilege_escalation: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'privilege_escalation' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privilege_escalation' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'privilege_escalation' type: normal [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 0 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privilege_escalation' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'privilege_escalation' type: normal [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-privilege_escalation: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-privilege_escalation: Task: 'privilege_escalation' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.029328629 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [insecure_capabilities] ✔️ PASSED: [insecure_capabilities] Containers with insecure capabilities were not found 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.insecure_capabilities: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'insecure_capabilities' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'insecure_capabilities' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'insecure_capabilities' type: normal [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'insecure_capabilities' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'insecure_capabilities' type: normal [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-insecure_capabilities: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-insecure_capabilities: Task: 'insecure_capabilities' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.025475173 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [memory_limits] ✔️ 🏆PASSED: [memory_limits] Containers have memory limits set 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.memory_limits: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'memory_limits' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'memory_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'memory_limits' type: essential [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'memory_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'memory_limits' type: essential [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-memory_limits: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-memory_limits: Task: 'memory_limits' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.023527392 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [cpu_limits] ✔️ 🏆PASSED: [cpu_limits] Containers have CPU limits set 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.cpu_limits: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'cpu_limits' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cpu_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'cpu_limits' type: essential [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'cpu_limits' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'cpu_limits' type: essential [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-cpu_limits: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-cpu_limits: Task: 'cpu_limits' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.022486481 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [linux_hardening] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: You can use AppArmor, Seccomp, SELinux and Linux Capabilities mechanisms to restrict containers abilities to utilize unwanted privileges. ✖️ ✨FAILED: [linux_hardening] Found resources that do not use security services 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.linux_hardening: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'linux_hardening' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'linux_hardening' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'linux_hardening' type: bonus [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: linux_hardening is worth: 0 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'linux_hardening' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'linux_hardening' type: bonus [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-linux_hardening: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-linux_hardening: Task: 'linux_hardening' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.022999123 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [ingress_egress_blocked] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Define a network policy that restricts ingress and egress connections. ✖️ ✨FAILED: [ingress_egress_blocked] Ingress and Egress traffic not blocked on pods 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.ingress_egress_blocked: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'ingress_egress_blocked' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'ingress_egress_blocked' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'ingress_egress_blocked' type: bonus [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: ingress_egress_blocked is worth: 0 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'ingress_egress_blocked' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'ingress_egress_blocked' type: bonus [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-ingress_egress_blocked: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-ingress_egress_blocked: Task: 'ingress_egress_blocked' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.022685053 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [host_pid_ipc_privileges] ✔️ PASSED: [host_pid_ipc_privileges] No containers with hostPID and hostIPC privileges 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.host_pid_ipc_privileges: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'host_pid_ipc_privileges' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_pid_ipc_privileges' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'host_pid_ipc_privileges' type: normal [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_pid_ipc_privileges' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'host_pid_ipc_privileges' type: normal [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-host_pid_ipc_privileges: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-host_pid_ipc_privileges: Task: 'host_pid_ipc_privileges' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.024580593 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [non_root_containers] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: If your application does not need root privileges, make sure to define runAsNonRoot as true or explicitly set the runAsUser using ID 1000 or higher under the PodSecurityContext or container securityContext. In addition, set an explicit value for runAsGroup using ID 1000 or higher. ✖️ 🏆FAILED: [non_root_containers] Found containers running with root user or user with root group membership 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.non_root_containers: Starting test [2025-07-10 12:04:33] INFO -- CNTI: kubescape parse [2025-07-10 12:04:33] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'non_root_containers' emoji: 🔓🔑 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'non_root_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'non_root_containers' type: essential [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 0 points [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'non_root_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points: Task: 'non_root_containers' type: essential [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Points.upsert_task-non_root_containers: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:33 UTC [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Points.upsert_task-non_root_containers: Task: 'non_root_containers' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.024691142 [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:33] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:33] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [privileged_containers] [2025-07-10 12:04:33] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.Task.task_runner.privileged_containers: Starting test [2025-07-10 12:04:33] DEBUG -- CNTI: white_list_container_names [] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:33] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:33] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:33] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.privileged_containers: Get privileged containers [2025-07-10 12:04:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:04:34] INFO -- CNTI-KubectlClient.Get.privileged_containers: Found 8 privileged containers [2025-07-10 12:04:34] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [privileged_containers] No privileged containers 🔓🔑 [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:04:34] DEBUG -- CNTI: violator list: [] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'privileged_containers' emoji: 🔓🔑 [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privileged_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points: Task: 'privileged_containers' type: essential [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'privileged_containers' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points: Task: 'privileged_containers' type: essential [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.upsert_task-privileged_containers: Task start time: 2025-07-10 12:04:33 UTC, end time: 2025-07-10 12:04:34 UTC [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Points.upsert_task-privileged_containers: Task: 'privileged_containers' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.570519206 [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:34] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:34] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:34] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:34] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:34] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [immutable_file_systems] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Set the filesystem of the container to read-only when possible (pod securityContext, readOnlyRootFilesystem: true). If containers application needs to write into the filesystem, it is recommended to mount secondary filesystems for specific directories where application require write access. ✖️ ✨FAILED: [immutable_file_systems] Found containers with mutable file systems 🔓🔑 [2025-07-10 12:04:34] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Task.task_runner.immutable_file_systems: Starting test [2025-07-10 12:04:34] INFO -- CNTI: kubescape parse [2025-07-10 12:04:34] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:34] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'immutable_file_systems' emoji: 🔓🔑 [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_file_systems' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_file_systems' type: bonus [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Points.task_points: Task: immutable_file_systems is worth: 0 points [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_file_systems' tags: ["security", "dynamic", "workload", "bonus"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_file_systems' type: bonus [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Points.upsert_task-immutable_file_systems: Task start time: 2025-07-10 12:04:34 UTC, end time: 2025-07-10 12:04:34 UTC [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Points.upsert_task-immutable_file_systems: Task: 'immutable_file_systems' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.036999693 [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:34] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:34] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:34] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:34] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:34] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostpath_mounts] [2025-07-10 12:04:34] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:34] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:34] INFO -- CNTI-CNFManager.Task.task_runner.hostpath_mounts: Starting test [2025-07-10 12:04:34] INFO -- CNTI: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan control C-0048 --output kubescape_C-0048_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite ✔️ 🏆PASSED: [hostpath_mounts] Containers do not have hostPath mounts 🔓🔑 [2025-07-10 12:04:39] INFO -- CNTI: output: ────────────────────────────────────────────────── ┌─────────────────┬───┐ │ Controls │ 1 │ │ Passed │ 1 │ │ Failed │ 0 │ │ Action Required │ 0 │ └─────────────────┴───┘ Failed resources by severity: ┌──────────┬───┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 0 │ │ Low │ 0 │ └──────────┴───┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬──────────────────┬──────────────────┬───────────────┬──────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ High │ HostPath mount │ 0 │ 1 │ 100% │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ │ Resource Summary │ 0 │ 1 │ 100.00% │ └──────────┴──────────────────┴──────────────────┴───────────────┴──────────────────┘ [2025-07-10 12:04:39] INFO -- CNTI: stderr: {"level":"info","ts":"2025-07-10T12:04:34Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-07-10T12:04:36Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loading policies..."} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loaded policies"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Done scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Scan results saved","filename":"kubescape_C-0048_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 100 {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Run with '--verbose'/'-v' flag for detailed resources view\n"} {"level":"info","ts":"2025-07-10T12:04:39Z","msg":"Received interrupt signal, exiting..."} [2025-07-10 12:04:39] INFO -- CNTI: kubescape parse [2025-07-10 12:04:39] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:39] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'hostpath_mounts' emoji: 🔓🔑 [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostpath_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points: Task: 'hostpath_mounts' type: essential [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostpath_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points: Task: 'hostpath_mounts' type: essential [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Points.upsert_task-hostpath_mounts: Task start time: 2025-07-10 12:04:34 UTC, end time: 2025-07-10 12:04:39 UTC [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.Points.upsert_task-hostpath_mounts: Task: 'hostpath_mounts' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:05.471060240 [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:39] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:39] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:39] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [container_sock_mounts] [2025-07-10 12:04:39] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:39] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:39] INFO -- CNTI-CNFManager.Task.task_runner.container_sock_mounts: Starting test [2025-07-10 12:04:39] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:40] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:04:41] INFO -- CNTI: TarClient.untar command: tar -xvf /tmp/kyvernojcje907x.tar.gz -C /home/xtesting/.cnf-testsuite/tools [2025-07-10 12:04:41] INFO -- CNTI: TarClient.untar output: LICENSE kyverno [2025-07-10 12:04:41] INFO -- CNTI: TarClient.untar stderr: [2025-07-10 12:04:41] INFO -- CNTI: GitClient.clone command: --branch release-1.9 https://github.com/kyverno/policies.git /home/xtesting/.cnf-testsuite/tools/kyverno-policies [2025-07-10 12:04:43] INFO -- CNTI: GitClient.clone output: [2025-07-10 12:04:43] INFO -- CNTI: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/kyverno-policies'... [2025-07-10 12:04:43] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml [2025-07-10 12:04:43] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml [2025-07-10 12:04:43] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml --cluster --policy-report ✔️ 🏆PASSED: [container_sock_mounts] Container engine daemon sockets are not mounted as volumes 🔓🔑 [2025-07-10 12:04:45] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 3 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149085 summary: error: 0 fail: 0 pass: 84 skip: 168 warn: 0 [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'container_sock_mounts' emoji: 🔓🔑 [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'container_sock_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points: Task: 'container_sock_mounts' type: essential [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'container_sock_mounts' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points: Task: 'container_sock_mounts' type: essential [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Points.upsert_task-container_sock_mounts: Task start time: 2025-07-10 12:04:39 UTC, end time: 2025-07-10 12:04:45 UTC [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.Points.upsert_task-container_sock_mounts: Task: 'container_sock_mounts' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:05.864958381 [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:45] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:45] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:45] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:45] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:45] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [external_ips] [2025-07-10 12:04:45] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:45] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:45] INFO -- CNTI-CNFManager.Task.task_runner.external_ips: Starting test [2025-07-10 12:04:45] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml [2025-07-10 12:04:45] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml [2025-07-10 12:04:45] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/restrict-service-external-ips/restrict-service-external-ips.yaml --cluster --policy-report ✔️ PASSED: [external_ips] Services are not using external IPs 🔓🔑 [2025-07-10 12:04:46] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 3 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: kubernetes namespace: default uid: 1f050786-33f4-41cf-ba32-4b00bdfc5895 result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149086 - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: kube-dns namespace: kube-system uid: d25357d2-925a-4b53-ac92-bd86b484812c result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149086 - message: validation rule 'check-ips' passed. policy: restrict-external-ips resources: - apiVersion: v1 kind: Service name: coredns-coredns namespace: cnf-default uid: e147ea7a-088e-42fc-9dcf-fa7e6c06a876 result: pass rule: check-ips scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149086 summary: error: 0 fail: 0 pass: 3 skip: 0 warn: 0 [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:46] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'external_ips' emoji: 🔓🔑 [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'external_ips' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points: Task: 'external_ips' type: normal [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'external_ips' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points: Task: 'external_ips' type: normal [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Points.upsert_task-external_ips: Task start time: 2025-07-10 12:04:45 UTC, end time: 2025-07-10 12:04:46 UTC [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.Points.upsert_task-external_ips: Task: 'external_ips' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.831120366 [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:46] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:46] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:46] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:46] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:46] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [selinux_options] [2025-07-10 12:04:46] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:46] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:46] INFO -- CNTI-CNFManager.Task.task_runner.selinux_options: Starting test [2025-07-10 12:04:46] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml [2025-07-10 12:04:46] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml [2025-07-10 12:04:46] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml --cluster --policy-report [2025-07-10 12:04:48] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149088 summary: error: 0 fail: 0 pass: 28 skip: 56 warn: 0 [2025-07-10 12:04:48] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml [2025-07-10 12:04:48] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml [2025-07-10 12:04:48] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml --cluster --policy-report ⏭️ 🏆N/A: [selinux_options] Pods are not using SELinux 🔓🔑 [2025-07-10 12:04:51] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149091 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:51] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'selinux_options' emoji: 🔓🔑 [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'selinux_options' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points: Task: 'selinux_options' type: essential [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.Points.task_points: Task: selinux_options is worth: 0 points [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'selinux_options' tags: ["security", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points: Task: 'selinux_options' type: essential [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Points.upsert_task-selinux_options: Task start time: 2025-07-10 12:04:46 UTC, end time: 2025-07-10 12:04:51 UTC [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.Points.upsert_task-selinux_options: Task: 'selinux_options' has status: 'na' and is awarded: 0 points.Runtime: 00:00:04.631736924 [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:51] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:51] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [sysctls] [2025-07-10 12:04:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:51] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:51] INFO -- CNTI-CNFManager.Task.task_runner.sysctls: Starting test [2025-07-10 12:04:51] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml [2025-07-10 12:04:51] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml [2025-07-10 12:04:51] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/restrict-sysctls/restrict-sysctls.yaml --cluster --policy-report ✔️ PASSED: [sysctls] No restricted values found for sysctls 🔓🔑 [2025-07-10 12:04:53] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: validation rule 'autogen-check-sysctls' passed. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 - message: Setting additional sysctls above the allowed type is disallowed. The field spec.securityContext.sysctls must be unset or not use any other names than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range, net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and net.ipv4.ping_group_range. policy: restrict-sysctls resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-check-sysctls scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149093 summary: error: 0 fail: 0 pass: 28 skip: 56 warn: 0 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'sysctls' emoji: 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sysctls' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'sysctls' type: normal [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sysctls' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'sysctls' type: normal [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-sysctls: Task start time: 2025-07-10 12:04:51 UTC, end time: 2025-07-10 12:04:53 UTC [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.upsert_task-sysctls: Task: 'sysctls' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.828841225 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [host_network] ✔️ PASSED: [host_network] No host network attached to pod 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.task_runner.host_network: Starting test [2025-07-10 12:04:53] INFO -- CNTI: kubescape parse [2025-07-10 12:04:53] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'host_network' emoji: 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_network' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'host_network' type: normal [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'host_network' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'host_network' type: normal [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-host_network: Task start time: 2025-07-10 12:04:53 UTC, end time: 2025-07-10 12:04:53 UTC [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.upsert_task-host_network: Task: 'host_network' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.028998465 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [service_account_mapping] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: Disable automatic mounting of service account tokens to pods either at the service account level or at the individual pod level, by specifying the automountServiceAccountToken: false. Note that pod level takes precedence. ✖️ FAILED: [service_account_mapping] Service accounts automatically mapped 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.task_runner.service_account_mapping: Starting test [2025-07-10 12:04:53] INFO -- CNTI: kubescape parse [2025-07-10 12:04:53] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'service_account_mapping' emoji: 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_account_mapping' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'service_account_mapping' type: normal [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 0 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_account_mapping' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'service_account_mapping' type: normal [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-service_account_mapping: Task start time: 2025-07-10 12:04:53 UTC, end time: 2025-07-10 12:04:53 UTC [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.upsert_task-service_account_mapping: Task: 'service_account_mapping' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:00.025119631 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [application_credentials] ✔️ PASSED: [application_credentials] No applications credentials in configuration files 🔓🔑 Security results: 12 of 15 tests passed  [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.task_runner.application_credentials: Starting test [2025-07-10 12:04:53] INFO -- CNTI: kubescape parse [2025-07-10 12:04:53] INFO -- CNTI: kubescape test_by_test_name [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'application_credentials' emoji: 🔓🔑 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'application_credentials' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'application_credentials' type: normal [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'application_credentials' tags: ["security", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'application_credentials' type: normal [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-application_credentials: Task start time: 2025-07-10 12:04:53 UTC, end time: 2025-07-10 12:04:53 UTC [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.upsert_task-application_credentials: Task: 'application_credentials' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.024867562 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tags: ["security"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 535, total tasks passed: 12 for tags: ["security"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 645, max tasks passed: 15 for tags: ["security"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tags: ["security"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 535, total tasks passed: 12 for tags: ["security"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "container_sock_mounts", "external_ips", "selinux_options"] for tag: security [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 645, max tasks passed: 15 for tags: ["security"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 700, total tasks passed: 7 for tags: ["essential"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-07-10 12:04:53] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 101, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-07-10 12:04:53] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-07-10 12:04:53] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}]} [2025-07-10 12:04:53] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}], "maximum_points" => 645} [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [nodeport_not_used] [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.task_runner.nodeport_not_used: Starting test [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:04:53] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:04:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:53] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:53] INFO -- CNTI-nodeport_not_used: nodeport_not_used resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:53] INFO -- CNTI-nodeport_not_used: nodeport_not_used resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:53] INFO -- CNTI-nodeport_not_used: resource kind: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Service/coredns-coredns ✔️ PASSED: [nodeport_not_used] NodePort is not used  [2025-07-10 12:04:53] DEBUG -- CNTI-nodeport_not_used: service: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4609341", "uid" => "e147ea7a-088e-42fc-9dcf-fa7e6c06a876"}, "spec" => {"clusterIP" => "10.96.78.210", "clusterIPs" => ["10.96.78.210"], "internalTrafficPolicy" => "Cluster", "ipFamilies" => ["IPv4"], "ipFamilyPolicy" => "SingleStack", "ports" => [{"name" => "udp-53", "port" => 53, "protocol" => "UDP", "targetPort" => 53}, {"name" => "tcp-53", "port" => 53, "protocol" => "TCP", "targetPort" => 53}], "selector" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}, "sessionAffinity" => "None", "type" => "ClusterIP"}, "status" => {"loadBalancer" => {}}} [2025-07-10 12:04:53] INFO -- CNTI-nodeport_not_used: service_type: ClusterIP [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'nodeport_not_used' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'nodeport_not_used' type: normal [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'nodeport_not_used' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points: Task: 'nodeport_not_used' type: normal [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-nodeport_not_used: Task start time: 2025-07-10 12:04:53 UTC, end time: 2025-07-10 12:04:53 UTC [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Points.upsert_task-nodeport_not_used: Task: 'nodeport_not_used' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.371791434 [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostport_not_used] [2025-07-10 12:04:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.Task.task_runner.hostport_not_used: Starting test [2025-07-10 12:04:53] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:53] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:53] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:54] INFO -- CNTI-hostport_not_used: hostport_not_used resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:54] INFO -- CNTI-hostport_not_used: resource kind: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "6", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "generation" => 9, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4610023", "uid" => "b4b807ce-b3a0-4bf5-af5e-d8036d3bf178"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-07-10T12:00:40Z", "lastUpdateTime" => "2025-07-10T12:00:40Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}, {"lastTransitionTime" => "2025-07-10T12:00:10Z", "lastUpdateTime" => "2025-07-10T12:01:42Z", "message" => "ReplicaSet \"coredns-coredns-56898dd654\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}], "observedGeneration" => 9, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: single_port: {"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"} [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: DAS hostPort: [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: single_port: {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"} [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: DAS hostPort: [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:54] INFO -- CNTI-hostport_not_used: hostport_not_used resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:54] INFO -- CNTI-hostport_not_used: resource kind: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Service/coredns-coredns ✔️ 🏆PASSED: [hostport_not_used] HostPort is not used  [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: resource: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4609341", "uid" => "e147ea7a-088e-42fc-9dcf-fa7e6c06a876"}, "spec" => {"clusterIP" => "10.96.78.210", "clusterIPs" => ["10.96.78.210"], "internalTrafficPolicy" => "Cluster", "ipFamilies" => ["IPv4"], "ipFamilyPolicy" => "SingleStack", "ports" => [{"name" => "udp-53", "port" => 53, "protocol" => "UDP", "targetPort" => 53}, {"name" => "tcp-53", "port" => 53, "protocol" => "TCP", "targetPort" => 53}], "selector" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}, "sessionAffinity" => "None", "type" => "ClusterIP"}, "status" => {"loadBalancer" => {}}} [2025-07-10 12:04:54] DEBUG -- CNTI-hostport_not_used: containers: [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostport_not_used' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points: Task: 'hostport_not_used' type: essential [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hostport_not_used' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points: Task: 'hostport_not_used' type: essential [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.upsert_task-hostport_not_used: Task start time: 2025-07-10 12:04:53 UTC, end time: 2025-07-10 12:04:54 UTC [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Points.upsert_task-hostport_not_used: Task: 'hostport_not_used' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.476083185 [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:54] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:54] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hardcoded_ip_addresses_in_k8s_runtime_configuration] [2025-07-10 12:04:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Task.task_runner.hardcoded_ip_addresses_in_k8s_runtime_configuration: Starting test [2025-07-10 12:04:54] DEBUG -- CNTI: Helm Path: helm [2025-07-10 12:04:54] INFO -- CNTI-KubectlClient.Delete.resource: Delete resource namespace/hardcoded-ip-test ✔️ 🏆PASSED: [hardcoded_ip_addresses_in_k8s_runtime_configuration] No hard-coded IP addresses found in the runtime K8s configuration  [2025-07-10 12:04:54] WARN -- CNTI-KubectlClient.Delete.resource.cmd: stderr: Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. Error from server (NotFound): namespaces "hardcoded-ip-test" not found [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' type: essential [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' type: essential [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Points.upsert_task-hardcoded_ip_addresses_in_k8s_runtime_configuration: Task start time: 2025-07-10 12:04:54 UTC, end time: 2025-07-10 12:04:54 UTC [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Points.upsert_task-hardcoded_ip_addresses_in_k8s_runtime_configuration: Task: 'hardcoded_ip_addresses_in_k8s_runtime_configuration' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.128293504 [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:54] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:54] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [secrets_used] [2025-07-10 12:04:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.Task.task_runner.secrets_used: Starting test [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:54] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:54] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:54] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:54] INFO -- CNTI-secrets_used: resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:54] INFO -- CNTI-secrets_used: volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-07-10 12:04:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource secrets No Secret Volumes or Container secretKeyRefs found for resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} Secrets not used. To address this issue please see the USAGE.md documentation ⏭️ ✨SKIPPED: [secrets_used] Secrets not used 🧫 [2025-07-10 12:04:55] DEBUG -- CNTI-secrets_used: secret name: sh.helm.release.v1.coredns.v1, type: helm.sh/release.v1, namespace: cnf-default [2025-07-10 12:04:55] DEBUG -- CNTI-secrets_used: container: coredns envs [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'secrets_used' emoji: 🧫 [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'secrets_used' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points: Task: 'secrets_used' type: bonus [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.Points.task_points: Task: secrets_used is worth: 0 points [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'secrets_used' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points: Task: 'secrets_used' type: bonus [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Points.upsert_task-secrets_used: Task start time: 2025-07-10 12:04:54 UTC, end time: 2025-07-10 12:04:55 UTC [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.Points.upsert_task-secrets_used: Task: 'secrets_used' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.388656041 [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:55] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:55] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [immutable_configmap] [2025-07-10 12:04:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.Task.task_runner.immutable_configmap: Starting test [2025-07-10 12:04:55] DEBUG -- CNTI-immutable_configmap: test immutable_configmap template: apiVersion: v1 kind: ConfigMap metadata: name: myapp immutable: true data: api.server: doesnt_matter [2025-07-10 12:04:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/test_config_map.yml [2025-07-10 12:04:55] DEBUG -- CNTI-immutable_configmap: test immutable_configmap change template: apiVersion: v1 kind: ConfigMap metadata: name: myapp immutable: true data: api.server: doesnt_matter_again [2025-07-10 12:04:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/test_config_map.yml [2025-07-10 12:04:55] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: The ConfigMap "myapp" is invalid: data: Forbidden: field is immutable when `immutable` is set [2025-07-10 12:04:55] INFO -- CNTI-immutable_configmap: immutable configmaps supported, continuing with test [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:55] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:55] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:04:55] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:04:55] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:04:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:56] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:04:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] [2025-07-10 12:04:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmaps [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}; Volume count: 1 [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Volume count for configmaps: 1 [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Will loop through configmap volumes [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap:volume_item: {"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"} [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap:configmap_item: {"apiVersion" => "v1", "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}, "kind" => "ConfigMap", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4609337", "uid" => "5cb7ba04-4839-4009-b8e8-68945a4e2118"}} [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap_fail_volume: {"apiVersion" => "v1", "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}, "kind" => "ConfigMap", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-07-10T12:00:10Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4609337", "uid" => "5cb7ba04-4839-4009-b8e8-68945a4e2118"}} [2025-07-10 12:04:56] INFO -- CNTI-container_volume_mounts: [{"mountPath" => "/etc/coredns", "name" => "config-volume"}] [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap_volumes: [{resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, container: "coredns", volume: "config-volume", configmap: "coredns-coredns"}] [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap_envs: [] [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: volumes: [{}] [2025-07-10 12:04:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmaps ✖️ ✨FAILED: [immutable_configmap] Found mutable configmap(s) ⚖️ [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}; Volume count: 1 [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Volume count for configmaps: 1 [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap: Will loop through configmap volumes [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap_volumes: [] [2025-07-10 12:04:56] INFO -- CNTI-immutable_configmap_envs: [] [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'immutable_configmap' emoji: ⚖️ [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_configmap' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_configmap' type: bonus [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Points.task_points: Task: immutable_configmap is worth: 0 points [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'immutable_configmap' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points: Task: 'immutable_configmap' type: bonus [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.upsert_task-immutable_configmap: Task start time: 2025-07-10 12:04:55 UTC, end time: 2025-07-10 12:04:56 UTC [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Points.upsert_task-immutable_configmap: Task: 'immutable_configmap' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:01.322801729 [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:56] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:56] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [alpha_k8s_apis] ⏭️ SKIPPED: [alpha_k8s_apis] alpha_k8s_apis not in poc mode ⭕🔍 [2025-07-10 12:04:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Task.task_runner.alpha_k8s_apis: Starting test [2025-07-10 12:04:56] INFO -- CNTI: args.raw [] [2025-07-10 12:04:56] INFO -- CNTI: args.raw [] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'alpha_k8s_apis' emoji: ⭕🔍 [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'alpha_k8s_apis' tags: ["configuration", "dynamic", "workload"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points: Task: 'alpha_k8s_apis' type: [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 0 points [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'alpha_k8s_apis' tags: ["configuration", "dynamic", "workload"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points: Task: 'alpha_k8s_apis' type: [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Points.upsert_task-alpha_k8s_apis: Task start time: 2025-07-10 12:04:56 UTC, end time: 2025-07-10 12:04:56 UTC [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Points.upsert_task-alpha_k8s_apis: Task: 'alpha_k8s_apis' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.017812155 [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:56] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:56] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [require_labels] [2025-07-10 12:04:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:56] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:56] INFO -- CNTI-CNFManager.Task.task_runner.require_labels: Starting test [2025-07-10 12:04:56] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml [2025-07-10 12:04:56] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml [2025-07-10 12:04:56] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/require_labels/require_labels.yaml --cluster --policy-report ✔️ PASSED: [require_labels] Pods have the app.kubernetes.io/name label 🏷️ [2025-07-10 12:04:58] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'check-for-labels' passed. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: validation rule 'autogen-check-for-labels' passed. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule autogen-check-for-labels failed at path /spec/template/metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: fail rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: 'validation error: The label `app.kubernetes.io/name` is required. rule check-for-labels failed at path /metadata/labels/app.kubernetes.io/name/' policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: fail rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: validation rule 'autogen-check-for-labels' passed. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: validation rule 'check-for-labels' passed. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 - message: The label `app.kubernetes.io/name` is required. policy: require-labels resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-check-for-labels scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149098 summary: error: 0 fail: 24 pass: 4 skip: 56 warn: 0 [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:04:58] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'require_labels' emoji: 🏷️ [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'require_labels' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points: Task: 'require_labels' type: normal [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'require_labels' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points: Task: 'require_labels' type: normal [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Points.upsert_task-require_labels: Task start time: 2025-07-10 12:04:56 UTC, end time: 2025-07-10 12:04:58 UTC [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.Points.upsert_task-require_labels: Task: 'require_labels' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.829670869 [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:04:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:04:58] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:04:58] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:04:58] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [latest_tag] [2025-07-10 12:04:58] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:04:58] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:04:58] INFO -- CNTI-CNFManager.Task.task_runner.latest_tag: Starting test [2025-07-10 12:04:58] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml [2025-07-10 12:04:58] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml [2025-07-10 12:04:58] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml --cluster --policy-report ✔️ 🏆PASSED: [latest_tag] Container images are not using the latest tag 🏷️ [2025-07-10 12:05:00] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149100 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:00] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'latest_tag' emoji: 🏷️ [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'latest_tag' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points: Task: 'latest_tag' type: essential [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'latest_tag' tags: ["configuration", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points: Task: 'latest_tag' type: essential [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Points.upsert_task-latest_tag: Task start time: 2025-07-10 12:04:58 UTC, end time: 2025-07-10 12:05:00 UTC [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.Points.upsert_task-latest_tag: Task: 'latest_tag' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:01.993355677 [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:00] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:00] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:00] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:00] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:00] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [default_namespace] [2025-07-10 12:05:00] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:00] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:00] INFO -- CNTI-CNFManager.Task.task_runner.default_namespace: Starting test [2025-07-10 12:05:00] INFO -- CNTI-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml [2025-07-10 12:05:00] INFO -- CNTI-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml [2025-07-10 12:05:00] INFO -- CNTI-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_default_namespace/disallow_default_namespace.yaml --cluster --policy-report ✔️ PASSED: [default_namespace] default namespace is not being used 🏷️ [2025-07-10 12:05:02] INFO -- CNTI-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 4abeb732-9b87-40ce-a9cd-9c3bc03197ca result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-7dc846544d-ltv2t namespace: local-path-storage uid: d9a228a5-1bbf-4508-816a-88bda52965b0 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-coredns-56898dd654-2js9x namespace: cnf-default uid: e7a23045-b167-4251-b263-10084835e501 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: b4b807ce-b3a0-4bf5-af5e-d8036d3bf178 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-2466n namespace: kube-system uid: f48127ba-b444-4632-9666-00508ee65a9c result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-nvrsb namespace: kube-system uid: 4bf361e6-1e6d-4550-9837-760d66a7d259 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: 59457e85-4401-4683-8b04-d543d38bb522 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: 023d64b1-d0e6-4db2-bd86-2dffdb5c1ef1 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: fa0f5cce-077a-4b0f-ac67-880a94eff419 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-r5tsk namespace: kube-system uid: c6a13750-7bb0-4aa1-8766-81efe70beccb result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-qwd9g namespace: kube-system uid: 1d807b5e-b228-4490-8496-542366a3b2d9 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-xdthc namespace: kube-system uid: 01ae2e31-81b9-4c9f-931b-726c68d0b2c7 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: eab17d7d-9c97-4268-aea3-b84309c39bb0 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 08ab6e72-1221-4c4d-b204-cd645822c9a1 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-brb7q namespace: kube-system uid: 9e7e8a68-d983-4f8f-8a3c-3679813a5ef0 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-xkjck namespace: kube-system uid: fe401fcf-e036-4a80-85ce-657da7092395 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kindnet-zvx7j namespace: kube-system uid: cb9c16b8-10d8-4a33-a30a-a389ca6b9aa4 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-proxy-8hhkt namespace: kube-system uid: 6531546e-b2c4-4813-a6f3-a53244ae9d85 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 415f160f-3da9-44f6-8705-8a211e490d50 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7q27c namespace: kube-system uid: e2d0ae08-7b71-4ea0-aa8f-48fc013446ad result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: create-loop-devs-dsrxz namespace: kube-system uid: 7f190298-4895-4e74-81e9-21b9e111d181 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 70e23eea-b017-4c4c-b38b-770fad6d9591 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3ce1ba06-b68f-4f1a-8f8f-fd5ab49af294 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-79ccw namespace: litmus uid: 41e1a9e6-e84c-416c-93c6-af2c070c38e1 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: 33f7f1ee-0708-42fe-aa62-7a48f58cd298 result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: skip rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-podcontroller-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 58e39799-82a7-4ab1-b2f8-b8ab7cd848cf result: pass rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-2gwh4 namespace: cnf-testsuite uid: 55aab1ee-161d-4716-bd96-2d596290bbb8 result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: validation rule 'validate-namespace' passed. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: pass rule: validate-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 - message: Using 'default' namespace is not allowed for pod controllers. policy: disallow-default-namespace resources: - apiVersion: v1 kind: Pod name: cluster-tools-htvs5 namespace: cnf-testsuite uid: 1939cf89-d6e6-483b-8a73-dbb0f735baeb result: skip rule: validate-podcontroller-namespace scored: true source: kyverno timestamp: nanos: 0 seconds: 1752149102 summary: error: 0 fail: 0 pass: 28 skip: 28 warn: 0 [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'default_namespace' emoji: 🏷️ [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'default_namespace' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points: Task: 'default_namespace' type: normal [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'default_namespace' tags: ["configuration", "dynamic", "workload", "normal"] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points: Task: 'default_namespace' type: normal [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.upsert_task-default_namespace: Task start time: 2025-07-10 12:05:00 UTC, end time: 2025-07-10 12:05:02 UTC [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Points.upsert_task-default_namespace: Task: 'default_namespace' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:01.769071060 [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:02] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:02] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:02] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:02] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:02] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [operator_installed] ⏭️ ✨N/A: [operator_installed] No Operators Found 🦖 ⚖️👀 KUBECONFIG is set as /home/xtesting/.kube/config. [2025-07-10 12:05:02] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Task.task_runner.operator_installed: Starting test [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_resources: Map block to CNF resources [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:05:02] INFO -- CNTI-operator_installed: Subscription Names: [] [2025-07-10 12:05:02] INFO -- CNTI-operator_installed: CSV Names: [] [2025-07-10 12:05:02] INFO -- CNTI-operator_installed: Succeeded CSV Names: [] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'operator_installed' emoji: ⚖️👀 [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'operator_installed' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points: Task: 'operator_installed' type: bonus [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Points.task_points: Task: operator_installed is worth: 0 points [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'operator_installed' tags: ["configuration", "dynamic", "workload", "bonus"] [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points: Task: 'operator_installed' type: bonus [2025-07-10 12:05:02] DEBUG -- CNTI-CNFManager.Points.upsert_task-operator_installed: Task start time: 2025-07-10 12:05:02 UTC, end time: 2025-07-10 12:05:02 UTC [2025-07-10 12:05:02] INFO -- CNTI-CNFManager.Points.upsert_task-operator_installed: Task: 'operator_installed' has status: 'na' and is awarded: 0 points.Runtime: 00:00:00.014507148 [2025-07-10 12:05:02] INFO -- CNTI-Setup.create_namespace: Creating namespace for CNTI testsuite [2025-07-10 12:05:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:02] INFO -- CNTI-KubectlClient.Apply.namespace: Create a namespace: cnf-testsuite cnf-testsuite namespace already exists on the Kubernetes cluster [2025-07-10 12:05:02] WARN -- CNTI-KubectlClient.Apply.namespace.cmd: stderr: Error from server (AlreadyExists): namespaces "cnf-testsuite" already exists [2025-07-10 12:05:02] INFO -- CNTI-Setup.create_namespace: cnf-testsuite namespace already exists, not creating [2025-07-10 12:05:02] INFO -- CNTI-KubectlClient.Utils.label: Label namespace/cnf-testsuite with pod-security.kubernetes.io/enforce=privileged [2025-07-10 12:05:02] INFO -- CNTI-KubectlClient.server_version: K8s server version is: 1.32.5 [2025-07-10 12:05:02] DEBUG -- CNTI: version_less_than: 1.32.5 < 1.25.0: false [2025-07-10 12:05:02] INFO -- CNTI-Helm.helm_repo_add: Adding helm repository: gatekeeper [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.helm_repo_add.cmd: command: helm repo add gatekeeper https://open-policy-agent.github.io/gatekeeper/charts [2025-07-10 12:05:02] INFO -- CNTI-Helm.install: Installing helm chart: gatekeeper/gatekeeper [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.install: Values: --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false [2025-07-10 12:05:02] DEBUG -- CNTI-Helm.install.cmd: command: helm install opa-gatekeeper --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false gatekeeper/gatekeeper --set auditInterval=1 --set postInstall.labelNamespace.enabled=false -n cnf-testsuite --set psp.enabled=false [2025-07-10 12:05:17] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: Waiting for manifest found in constraint_template.yml to install [2025-07-10 12:05:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file constraint_template.yml [2025-07-10 12:05:18] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: seconds elapsed while waiting: 0 [2025-07-10 12:05:19] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file constraint_template.yml [2025-07-10 12:05:19] INFO -- CNTI-KubectlClient.wait.wait_for_install_by_apply: Manifest constraint_template.yml is installed [2025-07-10 12:05:19] INFO -- CNTI-KubectlClient.wait.wait_for_condition: Wait for condition condition=established in crd/requiretags.constraints.gatekeeper.sh [2025-07-10 12:05:19] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file enforce-image-tag.yml [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:20] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:20] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:20] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:20] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:20] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [versioned_tag] [2025-07-10 12:05:20] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Task.task_runner.versioned_tag: Starting test [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:05:20] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:05:20] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:20] INFO -- CNTI: OPA.find_non_versioned_pod: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:20] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource requiretags/block-latest-tag ✔️ PASSED: [versioned_tag] Container images use versioned tags 🏷️ Configuration results: 7 of 9 tests passed  [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'versioned_tag' emoji: 🏷️ [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'versioned_tag' tags: ["configuration", "dynamic", "workload"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points: Task: 'versioned_tag' type: [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'versioned_tag' tags: ["configuration", "dynamic", "workload"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points: Task: 'versioned_tag' type: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.upsert_task-versioned_tag: Task start time: 2025-07-10 12:05:20 UTC, end time: 2025-07-10 12:05:20 UTC [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.upsert_task-versioned_tag: Task: 'versioned_tag' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:00.758823655 [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tags: ["configuration"] [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 320, total tasks passed: 7 for tags: ["configuration"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:05:20] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:20] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 325, max tasks passed: 9 for tags: ["configuration"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tags: ["configuration"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 320, total tasks passed: 7 for tags: ["configuration"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["versioned_tag", "ip_addresses", "operator_installed", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "alpha_k8s_apis", "require_labels", "default_namespace", "latest_tag"] for tag: configuration [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 325, max tasks passed: 9 for tags: ["configuration"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1000, total tasks passed: 10 for tags: ["essential"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-07-10 12:05:21] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 535, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:05:21] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:05:21] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}]} [2025-07-10 12:05:21] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}], "maximum_points" => 325} [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:21] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:21] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [log_output] [2025-07-10 12:05:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Task.task_runner.log_output: Starting test [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:05:21] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Utils.logs: Dump logs of Deployment/coredns-coredns ✔️ 🏆PASSED: [log_output] Resources output logs to stdout and stderr 📶☠️ [2025-07-10 12:05:21] INFO -- CNTI-Log lines: [pod/coredns-coredns-56898dd654-2js9x/coredns] .:53 [pod/coredns-coredns-56898dd654-2js9x/coredns] [INFO] plugin/reload: Running configuration MD5 = d8c79061f144bdb41e9378f9aa781f71 [pod/coredns-coredns-56898dd654-2js9x/coredns] CoreDNS-1.8.0 [pod/coredns-coredns-56898dd654-2js9x/coredns] linux/amd64, go1.15.3, 054c9ae [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'log_output' emoji: 📶☠️ [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'log_output' tags: ["observability", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points: Task: 'log_output' type: essential [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'log_output' tags: ["observability", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points: Task: 'log_output' type: essential [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Points.upsert_task-log_output: Task start time: 2025-07-10 12:05:21 UTC, end time: 2025-07-10 12:05:21 UTC [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Points.upsert_task-log_output: Task: 'log_output' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.409393926 [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:21] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:21] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [prometheus_traffic] [2025-07-10 12:05:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:21] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:21] INFO -- CNTI-CNFManager.Task.task_runner.prometheus_traffic: Starting test [2025-07-10 12:05:21] INFO -- CNTI: find_matching_processes [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:22] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:05:22] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 6 pods: cluster-tools-htvs5, gatekeeper-controller-manager-7cfb59478c-8bh89, gatekeeper-controller-manager-7cfb59478c-8xsck, create-loop-devs-nvrsb, kindnet-xkjck, kube-proxy-r5tsk [2025-07-10 12:05:23] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236", "image" => "docker.io/lfncnti/cluster-tools:v1.0.8", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:00:07Z"}}, "volumeMounts" => [{"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/host", "name" => "hostfs"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lg7s4", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:23] INFO -- CNTI: node_pid_by_container_id container_id: containerd://e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236 [2025-07-10 12:05:23] INFO -- CNTI: parse_container_id container_id: containerd://e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236 [2025-07-10 12:05:23] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:23] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:23] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:23] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:23] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:23Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:23Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:23] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f\",\n \"user_specified_image\": \"lfncnti/cluster-tools:v1.0.8\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-htvs5\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"1939cf89-d6e6-483b-8a73-dbb0f735baeb\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 2\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"cluster-tools/0.log\",\n \"metadata\": {\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/run/systemd/\",\n \"host_path\": \"/run/systemd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/proc\",\n \"host_path\": \"/proc\"\n },\n {\n \"container_path\": \"/host\",\n \"host_path\": \"/\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536\"\n }\n ]\n },\n \"pid\": 2433100,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"cluster-tools\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"lfncnti/cluster-tools:v1.0.8\",\n \"io.kubernetes.cri.sandbox-id\": \"95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5\",\n \"io.kubernetes.cri.sandbox-name\": \"cluster-tools-htvs5\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"1939cf89-d6e6-483b-8a73-dbb0f735baeb\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod1939cf89_d6e6_483b_8a73_dbb0f735baeb.slice:cri-containerd:e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 1000,\n \"path\": \"/dev/loop1000\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/loop128\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/loop129\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/loop130\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/loop131\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/loop132\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/loop133\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/loop134\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 135,\n \"path\": \"/dev/loop135\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 136,\n \"path\": \"/dev/loop136\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 137,\n \"path\": \"/dev/loop137\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 138,\n \"path\": \"/dev/loop138\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 139,\n \"path\": \"/dev/loop139\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 140,\n \"path\": \"/dev/loop140\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 141,\n \"path\": \"/dev/loop141\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 142,\n \"path\": \"/dev/loop142\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 143,\n \"path\": \"/dev/loop143\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 144,\n \"path\": \"/dev/loop144\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 145,\n \"path\": \"/dev/loop145\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 146,\n \"path\": \"/dev/loop146\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 147,\n \"path\": \"/dev/loop147\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 148,\n \"path\": \"/dev/loop148\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 149,\n \"path\": \"/dev/loop149\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 150,\n \"path\": \"/dev/loop150\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 151,\n \"path\": \"/dev/loop151\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 152,\n \"path\": \"/dev/loop152\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 153,\n \"path\": \"/dev/loop153\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 154,\n \"path\": \"/dev/loop154\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 155,\n \"path\": \"/dev/loop155\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 156,\n \"path\": \"/dev/loop156\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 157,\n \"path\": \"/dev/loop157\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 158,\n \"path\": \"/dev/loop158\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 159,\n \"path\": \"/dev/loop159\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 160,\n \"path\": \"/dev/loop160\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 161,\n \"path\": \"/dev/loop161\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 162,\n \"path\": \"/dev/loop162\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 163,\n \"path\": \"/dev/loop163\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 164,\n \"path\": \"/dev/loop164\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 165,\n \"path\": \"/dev/loop165\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 166,\n \"path\": \"/dev/loop166\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 167,\n \"path\": \"/dev/loop167\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 168,\n \"path\": \"/dev/loop168\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 169,\n \"path\": \"/dev/loop169\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 170,\n \"path\": \"/dev/loop170\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 171,\n \"path\": \"/dev/loop171\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 172,\n \"path\": \"/dev/loop172\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 173,\n \"path\": \"/dev/loop173\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 174,\n \"path\": \"/dev/loop174\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 175,\n \"path\": \"/dev/loop175\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 176,\n \"path\": \"/dev/loop176\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 177,\n \"path\": \"/dev/loop177\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 178,\n \"path\": \"/dev/loop178\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 179,\n \"path\": \"/dev/loop179\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 180,\n \"path\": \"/dev/loop180\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 181,\n \"path\": \"/dev/loop181\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 182,\n \"path\": \"/dev/loop182\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 183,\n \"path\": \"/dev/loop183\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 184,\n \"path\": \"/dev/loop184\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 185,\n \"path\": \"/dev/loop185\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 186,\n \"path\": \"/dev/loop186\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 187,\n \"path\": \"/dev/loop187\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 188,\n \"path\": \"/dev/loop188\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 189,\n \"path\": \"/dev/loop189\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 190,\n \"path\": \"/dev/loop190\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 191,\n \"path\": \"/dev/loop191\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 192,\n \"path\": \"/dev/loop192\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 193,\n \"path\": \"/dev/loop193\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 194,\n \"path\": \"/dev/loop194\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 195,\n \"path\": \"/dev/loop195\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 196,\n \"path\": \"/dev/loop196\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 197,\n \"path\": \"/dev/loop197\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 198,\n \"path\": \"/dev/loop198\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 199,\n \"path\": \"/dev/loop199\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 200,\n \"path\": \"/dev/loop200\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 201,\n \"path\": \"/dev/loop201\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 202,\n \"path\": \"/dev/loop202\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 203,\n \"path\": \"/dev/loop203\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 204,\n \"path\": \"/dev/loop204\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 205,\n \"path\": \"/dev/loop205\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 206,\n \"path\": \"/dev/loop206\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 207,\n \"path\": \"/dev/loop207\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 208,\n \"path\": \"/dev/loop208\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 209,\n \"path\": \"/dev/loop209\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 210,\n \"path\": \"/dev/loop210\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 211,\n \"path\": \"/dev/loop211\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 212,\n \"path\": \"/dev/loop212\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 213,\n \"path\": \"/dev/loop213\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 214,\n \"path\": \"/dev/loop214\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 215,\n \"path\": \"/dev/loop215\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 216,\n \"path\": \"/dev/loop216\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 217,\n \"path\": \"/dev/loop217\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 218,\n \"path\": \"/dev/loop218\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 219,\n \"path\": \"/dev/loop219\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 220,\n \"path\": \"/dev/loop220\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 221,\n \"path\": \"/dev/loop221\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 222,\n \"path\": \"/dev/loop222\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 223,\n \"path\": \"/dev/loop223\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 224,\n \"path\": \"/dev/loop224\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 225,\n \"path\": \"/dev/loop225\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 226,\n \"path\": \"/dev/loop226\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 227,\n \"path\": \"/dev/loop227\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 228,\n \"path\": \"/dev/loop228\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 229,\n \"path\": \"/dev/loop229\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 230,\n \"path\": \"/dev/loop230\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 231,\n \"path\": \"/dev/loop231\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 232,\n \"path\": \"/dev/loop232\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 233,\n \"path\": \"/dev/loop233\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 234,\n \"path\": \"/dev/loop234\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 235,\n \"path\": \"/dev/loop235\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 236,\n \"path\": \"/dev/loop236\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 237,\n \"path\": \"/dev/loop237\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 238,\n \"path\": \"/dev/loop238\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 239,\n \"path\": \"/dev/loop239\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 240,\n \"path\": \"/dev/loop240\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 241,\n \"path\": \"/dev/loop241\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 242,\n \"path\": \"/dev/loop242\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 243,\n \"path\": \"/dev/loop243\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 244,\n \"path\": \"/dev/loop244\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 245,\n \"path\": \"/dev/loop245\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 246,\n \"path\": \"/dev/loop246\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 247,\n \"path\": \"/dev/loop247\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 248,\n \"path\": \"/dev/loop248\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 249,\n \"path\": \"/dev/loop249\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 250,\n \"path\": \"/dev/loop250\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 251,\n \"path\": \"/dev/loop251\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 252,\n \"path\": \"/dev/loop252\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 253,\n \"path\": \"/dev/loop253\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 254,\n \"path\": \"/dev/loop254\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 255,\n \"path\": \"/dev/loop255\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 256,\n \"path\": \"/dev/loop256\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 257,\n \"path\": \"/dev/loop257\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 258,\n \"path\": \"/dev/loop258\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 259,\n \"path\": \"/dev/loop259\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 260,\n \"path\": \"/dev/loop260\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 261,\n \"path\": \"/dev/loop261\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 262,\n \"path\": \"/dev/loop262\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 263,\n \"path\": \"/dev/loop263\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 264,\n \"path\": \"/dev/loop264\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 265,\n \"path\": \"/dev/loop265\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 266,\n \"path\": \"/dev/loop266\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 267,\n \"path\": \"/dev/loop267\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 268,\n \"path\": \"/dev/loop268\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 269,\n \"path\": \"/dev/loop269\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 270,\n \"path\": \"/dev/loop270\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 271,\n \"path\": \"/dev/loop271\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 272,\n \"path\": \"/dev/loop272\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 273,\n \"path\": \"/dev/loop273\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 274,\n \"path\": \"/dev/loop274\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 275,\n \"path\": \"/dev/loop275\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 276,\n \"path\": \"/dev/loop276\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 277,\n \"path\": \"/dev/loop277\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 278,\n \"path\": \"/dev/loop278\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 279,\n \"path\": \"/dev/loop279\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 280,\n \"path\": \"/dev/loop280\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 281,\n \"path\": \"/dev/loop281\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 282,\n \"path\": \"/dev/loop282\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 283,\n \"path\": \"/dev/loop283\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 284,\n \"path\": \"/dev/loop284\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 285,\n \"path\": \"/dev/loop285\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 286,\n \"path\": \"/dev/loop286\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 287,\n \"path\": \"/dev/loop287\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 288,\n \"path\": \"/dev/loop288\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 289,\n \"path\": \"/dev/loop289\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 290,\n \"path\": \"/dev/loop290\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 291,\n \"path\": \"/dev/loop291\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 292,\n \"path\": \"/dev/loop292\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 293,\n \"path\": \"/dev/loop293\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 294,\n \"path\": \"/dev/loop294\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 295,\n \"path\": \"/dev/loop295\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 296,\n \"path\": \"/dev/loop296\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 297,\n \"path\": \"/dev/loop297\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 298,\n \"path\": \"/dev/loop298\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 299,\n \"path\": \"/dev/loop299\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 300,\n \"path\": \"/dev/loop300\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 301,\n \"path\": \"/dev/loop301\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 302,\n \"path\": \"/dev/loop302\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 303,\n \"path\": \"/dev/loop303\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 304,\n \"path\": \"/dev/loop304\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 305,\n \"path\": \"/dev/loop305\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 306,\n \"path\": \"/dev/loop306\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 307,\n \"path\": \"/dev/loop307\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 308,\n \"path\": \"/dev/loop308\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 309,\n \"path\": \"/dev/loop309\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 310,\n \"path\": \"/dev/loop310\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 311,\n \"path\": \"/dev/loop311\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 312,\n \"path\": \"/dev/loop312\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 313,\n \"path\": \"/dev/loop313\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 314,\n \"path\": \"/dev/loop314\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 315,\n \"path\": \"/dev/loop315\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 316,\n \"path\": \"/dev/loop316\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 317,\n \"path\": \"/dev/loop317\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 318,\n \"path\": \"/dev/loop318\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 319,\n \"path\": \"/dev/loop319\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 320,\n \"path\": \"/dev/loop320\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 321,\n \"path\": \"/dev/loop321\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 322,\n \"path\": \"/dev/loop322\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 323,\n \"path\": \"/dev/loop323\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 324,\n \"path\": \"/dev/loop324\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 325,\n \"path\": \"/dev/loop325\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 326,\n \"path\": \"/dev/loop326\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 327,\n \"path\": \"/dev/loop327\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 328,\n \"path\": \"/dev/loop328\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 329,\n \"path\": \"/dev/loop329\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 330,\n \"path\": \"/dev/loop330\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 331,\n \"path\": \"/dev/loop331\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 332,\n \"path\": \"/dev/loop332\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 333,\n \"path\": \"/dev/loop333\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 334,\n \"path\": \"/dev/loop334\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 335,\n \"path\": \"/dev/loop335\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 336,\n \"path\": \"/dev/loop336\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 337,\n \"path\": \"/dev/loop337\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 338,\n \"path\": \"/dev/loop338\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 339,\n \"path\": \"/dev/loop339\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 340,\n \"path\": \"/dev/loop340\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 341,\n \"path\": \"/dev/loop341\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 342,\n \"path\": \"/dev/loop342\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 343,\n \"path\": \"/dev/loop343\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 344,\n \"path\": \"/dev/loop344\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 345,\n \"path\": \"/dev/loop345\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 346,\n \"path\": \"/dev/loop346\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 347,\n \"path\": \"/dev/loop347\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 348,\n \"path\": \"/dev/loop348\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 349,\n \"path\": \"/dev/loop349\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 350,\n \"path\": \"/dev/loop350\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 351,\n \"path\": \"/dev/loop351\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 352,\n \"path\": \"/dev/loop352\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 353,\n \"path\": \"/dev/loop353\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 354,\n \"path\": \"/dev/loop354\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 355,\n \"path\": \"/dev/loop355\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 356,\n \"path\": \"/dev/loop356\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 357,\n \"path\": \"/dev/loop357\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 358,\n \"path\": \"/dev/loop358\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 359,\n \"path\": \"/dev/loop359\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 360,\n \"path\": \"/dev/loop360\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 361,\n \"path\": \"/dev/loop361\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 362,\n \"path\": \"/dev/loop362\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 363,\n \"path\": \"/dev/loop363\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 364,\n \"path\": \"/dev/loop364\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 365,\n \"path\": \"/dev/loop365\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 366,\n \"path\": \"/dev/loop366\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 367,\n \"path\": \"/dev/loop367\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 368,\n \"path\": \"/dev/loop368\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 369,\n \"path\": \"/dev/loop369\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 370,\n \"path\": \"/dev/loop370\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 371,\n \"path\": \"/dev/loop371\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 372,\n \"path\": \"/dev/loop372\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 373,\n \"path\": \"/dev/loop373\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 374,\n \"path\": \"/dev/loop374\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 375,\n \"path\": \"/dev/loop375\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 376,\n \"path\": \"/dev/loop376\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 377,\n \"path\": \"/dev/loop377\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 378,\n \"path\": \"/dev/loop378\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 379,\n \"path\": \"/dev/loop379\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 380,\n \"path\": \"/dev/loop380\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 381,\n \"path\": \"/dev/loop381\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 382,\n \"path\": \"/dev/loop382\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 383,\n \"path\": \"/dev/loop383\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 384,\n \"path\": \"/dev/loop384\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 385,\n \"path\": \"/dev/loop385\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 386,\n \"path\": \"/dev/loop386\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 387,\n \"path\": \"/dev/loop387\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 388,\n \"path\": \"/dev/loop388\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 389,\n \"path\": \"/dev/loop389\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 390,\n \"path\": \"/dev/loop390\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 391,\n \"path\": \"/dev/loop391\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 392,\n \"path\": \"/dev/loop392\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 393,\n \"path\": \"/dev/loop393\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 394,\n \"path\": \"/dev/loop394\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 395,\n \"path\": \"/dev/loop395\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 396,\n \"path\": \"/dev/loop396\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 397,\n \"path\": \"/dev/loop397\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 398,\n \"path\": \"/dev/loop398\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 399,\n \"path\": \"/dev/loop399\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 400,\n \"path\": \"/dev/loop400\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 401,\n \"path\": \"/dev/loop401\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 402,\n \"path\": \"/dev/loop402\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 403,\n \"path\": \"/dev/loop403\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 404,\n \"path\": \"/dev/loop404\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 405,\n \"path\": \"/dev/loop405\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 406,\n \"path\": \"/dev/loop406\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 407,\n \"path\": \"/dev/loop407\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 408,\n \"path\": \"/dev/loop408\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 409,\n \"path\": \"/dev/loop409\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 410,\n \"path\": \"/dev/loop410\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 411,\n \"path\": \"/dev/loop411\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 412,\n \"path\": \"/dev/loop412\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 413,\n \"path\": \"/dev/loop413\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 414,\n \"path\": \"/dev/loop414\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 415,\n \"path\": \"/dev/loop415\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 416,\n \"path\": \"/dev/loop416\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 417,\n \"path\": \"/dev/loop417\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 418,\n \"path\": \"/dev/loop418\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 419,\n \"path\": \"/dev/loop419\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 420,\n \"path\": \"/dev/loop420\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 421,\n \"path\": \"/dev/loop421\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 422,\n \"path\": \"/dev/loop422\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 423,\n \"path\": \"/dev/loop423\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 424,\n \"path\": \"/dev/loop424\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 425,\n \"path\": \"/dev/loop425\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 426,\n \"path\": \"/dev/loop426\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 427,\n \"path\": \"/dev/loop427\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 428,\n \"path\": \"/dev/loop428\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 429,\n \"path\": \"/dev/loop429\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 430,\n \"path\": \"/dev/loop430\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 431,\n \"path\": \"/dev/loop431\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 432,\n \"path\": \"/dev/loop432\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 433,\n \"path\": \"/dev/loop433\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 434,\n \"path\": \"/dev/loop434\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 435,\n \"path\": \"/dev/loop435\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 436,\n \"path\": \"/dev/loop436\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 437,\n \"path\": \"/dev/loop437\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 438,\n \"path\": \"/dev/loop438\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 439,\n \"path\": \"/dev/loop439\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 440,\n \"path\": \"/dev/loop440\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 441,\n \"path\": \"/dev/loop441\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 442,\n \"path\": \"/dev/loop442\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 443,\n \"path\": \"/dev/loop443\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 444,\n \"path\": \"/dev/loop444\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 445,\n \"path\": \"/dev/loop445\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 446,\n \"path\": \"/dev/loop446\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 447,\n \"path\": \"/dev/loop447\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 448,\n \"path\": \"/dev/loop448\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 449,\n \"path\": \"/dev/loop449\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 450,\n \"path\": \"/dev/loop450\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 451,\n \"path\": \"/dev/loop451\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 452,\n \"path\": \"/dev/loop452\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 453,\n \"path\": \"/dev/loop453\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 454,\n \"path\": \"/dev/loop454\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 455,\n \"path\": \"/dev/loop455\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 456,\n \"path\": \"/dev/loop456\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 457,\n \"path\": \"/dev/loop457\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 458,\n \"path\": \"/dev/loop458\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 459,\n \"path\": \"/dev/loop459\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 460,\n \"path\": \"/dev/loop460\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 461,\n \"path\": \"/dev/loop461\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 462,\n \"path\": \"/dev/loop462\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 463,\n \"path\": \"/dev/loop463\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 464,\n \"path\": \"/dev/loop464\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 465,\n \"path\": \"/dev/loop465\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 466,\n \"path\": \"/dev/loop466\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 467,\n \"path\": \"/dev/loop467\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 468,\n \"path\": \"/dev/loop468\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 469,\n \"path\": \"/dev/loop469\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 470,\n \"path\": \"/dev/loop470\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 471,\n \"path\": \"/dev/loop471\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 472,\n \"path\": \"/dev/loop472\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 473,\n \"path\": \"/dev/loop473\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 474,\n \"path\": \"/dev/loop474\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 475,\n \"path\": \"/dev/loop475\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 476,\n \"path\": \"/dev/loop476\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 477,\n \"path\": \"/dev/loop477\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 478,\n \"path\": \"/dev/loop478\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 479,\n \"path\": \"/dev/loop479\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 480,\n \"path\": \"/dev/loop480\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 481,\n \"path\": \"/dev/loop481\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 482,\n \"path\": \"/dev/loop482\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 483,\n \"path\": \"/dev/loop483\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 484,\n \"path\": \"/dev/loop484\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 485,\n \"path\": \"/dev/loop485\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 486,\n \"path\": \"/dev/loop486\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 487,\n \"path\": \"/dev/loop487\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 488,\n \"path\": \"/dev/loop488\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 489,\n \"path\": \"/dev/loop489\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 490,\n \"path\": \"/dev/loop490\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 491,\n \"path\": \"/dev/loop491\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 492,\n \"path\": \"/dev/loop492\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 493,\n \"path\": \"/dev/loop493\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 494,\n \"path\": \"/dev/loop494\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 495,\n \"path\": \"/dev/loop495\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 496,\n \"path\": \"/dev/loop496\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 497,\n \"path\": \"/dev/loop497\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 498,\n \"path\": \"/dev/loop498\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 499,\n \"path\": \"/dev/loop499\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 500,\n \"path\": \"/dev/loop500\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 501,\n \"path\": \"/dev/loop501\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 502,\n \"path\": \"/dev/loop502\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 503,\n \"path\": \"/dev/loop503\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 504,\n \"path\": \"/dev/loop504\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 505,\n \"path\": \"/dev/loop505\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 506,\n \"path\": \"/dev/loop506\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 507,\n \"path\": \"/dev/loop507\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 508,\n \"path\": \"/dev/loop508\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 509,\n \"path\": \"/dev/loop509\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 510,\n \"path\": \"/dev/loop510\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 511,\n \"path\": \"/dev/loop511\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 512,\n \"path\": \"/dev/loop512\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 513,\n \"path\": \"/dev/loop513\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 514,\n \"path\": \"/dev/loop514\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 515,\n \"path\": \"/dev/loop515\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 516,\n \"path\": \"/dev/loop516\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 517,\n \"path\": \"/dev/loop517\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 518,\n \"path\": \"/dev/loop518\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 519,\n \"path\": \"/dev/loop519\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 520,\n \"path\": \"/dev/loop520\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 521,\n \"path\": \"/dev/loop521\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 522,\n \"path\": \"/dev/loop522\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 523,\n \"path\": \"/dev/loop523\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 524,\n \"path\": \"/dev/loop524\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 525,\n \"path\": \"/dev/loop525\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 526,\n \"path\": \"/dev/loop526\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 527,\n \"path\": \"/dev/loop527\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 528,\n \"path\": \"/dev/loop528\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 529,\n \"path\": \"/dev/loop529\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 530,\n \"path\": \"/dev/loop530\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 531,\n \"path\": \"/dev/loop531\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 532,\n \"path\": \"/dev/loop532\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 533,\n \"path\": \"/dev/loop533\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 534,\n \"path\": \"/dev/loop534\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 535,\n \"path\": \"/dev/loop535\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 536,\n \"path\": \"/dev/loop536\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 537,\n \"path\": \"/dev/loop537\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 538,\n \"path\": \"/dev/loop538\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 539,\n \"path\": \"/dev/loop539\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 540,\n \"path\": \"/dev/loop540\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 541,\n \"path\": \"/dev/loop541\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 542,\n \"path\": \"/dev/loop542\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 543,\n \"path\": \"/dev/loop543\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 544,\n \"path\": \"/dev/loop544\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 545,\n \"path\": \"/dev/loop545\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 546,\n \"path\": \"/dev/loop546\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 547,\n \"path\": \"/dev/loop547\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 548,\n \"path\": \"/dev/loop548\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 549,\n \"path\": \"/dev/loop549\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 550,\n \"path\": \"/dev/loop550\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 551,\n \"path\": \"/dev/loop551\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 552,\n \"path\": \"/dev/loop552\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 553,\n \"path\": \"/dev/loop553\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 554,\n \"path\": \"/dev/loop554\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 555,\n \"path\": \"/dev/loop555\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 556,\n \"path\": \"/dev/loop556\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 557,\n \"path\": \"/dev/loop557\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 558,\n \"path\": \"/dev/loop558\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 559,\n \"path\": \"/dev/loop559\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 560,\n \"path\": \"/dev/loop560\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 561,\n \"path\": \"/dev/loop561\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 562,\n \"path\": \"/dev/loop562\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 563,\n \"path\": \"/dev/loop563\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 564,\n \"path\": \"/dev/loop564\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 565,\n \"path\": \"/dev/loop565\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 566,\n \"path\": \"/dev/loop566\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 567,\n \"path\": \"/dev/loop567\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 568,\n \"path\": \"/dev/loop568\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 569,\n \"path\": \"/dev/loop569\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 570,\n \"path\": \"/dev/loop570\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 571,\n \"path\": \"/dev/loop571\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 572,\n \"path\": \"/dev/loop572\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 573,\n \"path\": \"/dev/loop573\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 574,\n \"path\": \"/dev/loop574\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 575,\n \"path\": \"/dev/loop575\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 576,\n \"path\": \"/dev/loop576\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 577,\n \"path\": \"/dev/loop577\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 578,\n \"path\": \"/dev/loop578\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 579,\n \"path\": \"/dev/loop579\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 580,\n \"path\": \"/dev/loop580\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 581,\n \"path\": \"/dev/loop581\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 582,\n \"path\": \"/dev/loop582\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 583,\n \"path\": \"/dev/loop583\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 584,\n \"path\": \"/dev/loop584\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 585,\n \"path\": \"/dev/loop585\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 586,\n \"path\": \"/dev/loop586\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 587,\n \"path\": \"/dev/loop587\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 588,\n \"path\": \"/dev/loop588\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 589,\n \"path\": \"/dev/loop589\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 590,\n \"path\": \"/dev/loop590\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 591,\n \"path\": \"/dev/loop591\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 592,\n \"path\": \"/dev/loop592\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 593,\n \"path\": \"/dev/loop593\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 594,\n \"path\": \"/dev/loop594\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 595,\n \"path\": \"/dev/loop595\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 596,\n \"path\": \"/dev/loop596\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 597,\n \"path\": \"/dev/loop597\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 598,\n \"path\": \"/dev/loop598\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 599,\n \"path\": \"/dev/loop599\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 600,\n \"path\": \"/dev/loop600\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 601,\n \"path\": \"/dev/loop601\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 602,\n \"path\": \"/dev/loop602\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 603,\n \"path\": \"/dev/loop603\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 604,\n \"path\": \"/dev/loop604\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 605,\n \"path\": \"/dev/loop605\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 606,\n \"path\": \"/dev/loop606\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 607,\n \"path\": \"/dev/loop607\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 608,\n \"path\": \"/dev/loop608\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 609,\n \"path\": \"/dev/loop609\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 610,\n \"path\": \"/dev/loop610\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 611,\n \"path\": \"/dev/loop611\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 612,\n \"path\": \"/dev/loop612\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 613,\n \"path\": \"/dev/loop613\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 614,\n \"path\": \"/dev/loop614\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 615,\n \"path\": \"/dev/loop615\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 616,\n \"path\": \"/dev/loop616\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 617,\n \"path\": \"/dev/loop617\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 618,\n \"path\": \"/dev/loop618\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 619,\n \"path\": \"/dev/loop619\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 620,\n \"path\": \"/dev/loop620\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 621,\n \"path\": \"/dev/loop621\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 622,\n \"path\": \"/dev/loop622\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 623,\n \"path\": \"/dev/loop623\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 624,\n \"path\": \"/dev/loop624\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 625,\n \"path\": \"/dev/loop625\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 626,\n \"path\": \"/dev/loop626\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 627,\n \"path\": \"/dev/loop627\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 628,\n \"path\": \"/dev/loop628\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 629,\n \"path\": \"/dev/loop629\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 630,\n \"path\": \"/dev/loop630\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 631,\n \"path\": \"/dev/loop631\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 632,\n \"path\": \"/dev/loop632\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 633,\n \"path\": \"/dev/loop633\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 634,\n \"path\": \"/dev/loop634\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 635,\n \"path\": \"/dev/loop635\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 636,\n \"path\": \"/dev/loop636\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 637,\n \"path\": \"/dev/loop637\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 638,\n \"path\": \"/dev/loop638\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 639,\n \"path\": \"/dev/loop639\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 640,\n \"path\": \"/dev/loop640\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 641,\n \"path\": \"/dev/loop641\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 642,\n \"path\": \"/dev/loop642\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 643,\n \"path\": \"/dev/loop643\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 644,\n \"path\": \"/dev/loop644\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 645,\n \"path\": \"/dev/loop645\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 646,\n \"path\": \"/dev/loop646\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 647,\n \"path\": \"/dev/loop647\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 648,\n \"path\": \"/dev/loop648\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 649,\n \"path\": \"/dev/loop649\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 650,\n \"path\": \"/dev/loop650\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 651,\n \"path\": \"/dev/loop651\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 652,\n \"path\": \"/dev/loop652\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 653,\n \"path\": \"/dev/loop653\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 654,\n \"path\": \"/dev/loop654\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 655,\n \"path\": \"/dev/loop655\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 656,\n \"path\": \"/dev/loop656\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 657,\n \"path\": \"/dev/loop657\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 658,\n \"path\": \"/dev/loop658\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 659,\n \"path\": \"/dev/loop659\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 660,\n \"path\": \"/dev/loop660\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 661,\n \"path\": \"/dev/loop661\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 662,\n \"path\": \"/dev/loop662\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 663,\n \"path\": \"/dev/loop663\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 664,\n \"path\": \"/dev/loop664\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 665,\n \"path\": \"/dev/loop665\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 666,\n \"path\": \"/dev/loop666\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 667,\n \"path\": \"/dev/loop667\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 668,\n \"path\": \"/dev/loop668\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 669,\n \"path\": \"/dev/loop669\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 670,\n \"path\": \"/dev/loop670\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 671,\n \"path\": \"/dev/loop671\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 672,\n \"path\": \"/dev/loop672\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 673,\n \"path\": \"/dev/loop673\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 674,\n \"path\": \"/dev/loop674\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 675,\n \"path\": \"/dev/loop675\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 676,\n \"path\": \"/dev/loop676\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 677,\n \"path\": \"/dev/loop677\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 678,\n \"path\": \"/dev/loop678\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 679,\n \"path\": \"/dev/loop679\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 680,\n \"path\": \"/dev/loop680\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 681,\n \"path\": \"/dev/loop681\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 682,\n \"path\": \"/dev/loop682\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 683,\n \"path\": \"/dev/loop683\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 684,\n \"path\": \"/dev/loop684\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 685,\n \"path\": \"/dev/loop685\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 686,\n \"path\": \"/dev/loop686\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 687,\n \"path\": \"/dev/loop687\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 688,\n \"path\": \"/dev/loop688\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 689,\n \"path\": \"/dev/loop689\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 690,\n \"path\": \"/dev/loop690\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 691,\n \"path\": \"/dev/loop691\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 692,\n \"path\": \"/dev/loop692\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 693,\n \"path\": \"/dev/loop693\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 694,\n \"path\": \"/dev/loop694\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 695,\n \"path\": \"/dev/loop695\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 696,\n \"path\": \"/dev/loop696\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 697,\n \"path\": \"/dev/loop697\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 698,\n \"path\": \"/dev/loop698\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 699,\n \"path\": \"/dev/loop699\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 700,\n \"path\": \"/dev/loop700\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 701,\n \"path\": \"/dev/loop701\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 702,\n \"path\": \"/dev/loop702\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 703,\n \"path\": \"/dev/loop703\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 704,\n \"path\": \"/dev/loop704\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 705,\n \"path\": \"/dev/loop705\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 706,\n \"path\": \"/dev/loop706\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 707,\n \"path\": \"/dev/loop707\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 708,\n \"path\": \"/dev/loop708\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 709,\n \"path\": \"/dev/loop709\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 710,\n \"path\": \"/dev/loop710\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 711,\n \"path\": \"/dev/loop711\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 712,\n \"path\": \"/dev/loop712\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 713,\n \"path\": \"/dev/loop713\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 714,\n \"path\": \"/dev/loop714\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 715,\n \"path\": \"/dev/loop715\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 716,\n \"path\": \"/dev/loop716\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 717,\n \"path\": \"/dev/loop717\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 718,\n \"path\": \"/dev/loop718\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 719,\n \"path\": \"/dev/loop719\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 720,\n \"path\": \"/dev/loop720\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 721,\n \"path\": \"/dev/loop721\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 722,\n \"path\": \"/dev/loop722\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 723,\n \"path\": \"/dev/loop723\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 724,\n \"path\": \"/dev/loop724\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 725,\n \"path\": \"/dev/loop725\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 726,\n \"path\": \"/dev/loop726\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 727,\n \"path\": \"/dev/loop727\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 728,\n \"path\": \"/dev/loop728\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 729,\n \"path\": \"/dev/loop729\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 730,\n \"path\": \"/dev/loop730\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 731,\n \"path\": \"/dev/loop731\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 732,\n \"path\": \"/dev/loop732\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 733,\n \"path\": \"/dev/loop733\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 734,\n \"path\": \"/dev/loop734\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 735,\n \"path\": \"/dev/loop735\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 736,\n \"path\": \"/dev/loop736\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 737,\n \"path\": \"/dev/loop737\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 738,\n \"path\": \"/dev/loop738\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 739,\n \"path\": \"/dev/loop739\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 740,\n \"path\": \"/dev/loop740\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 741,\n \"path\": \"/dev/loop741\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 742,\n \"path\": \"/dev/loop742\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 743,\n \"path\": \"/dev/loop743\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 744,\n \"path\": \"/dev/loop744\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 745,\n \"path\": \"/dev/loop745\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 746,\n \"path\": \"/dev/loop746\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 747,\n \"path\": \"/dev/loop747\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 748,\n \"path\": \"/dev/loop748\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 749,\n \"path\": \"/dev/loop749\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 750,\n \"path\": \"/dev/loop750\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 751,\n \"path\": \"/dev/loop751\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 752,\n \"path\": \"/dev/loop752\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 753,\n \"path\": \"/dev/loop753\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 754,\n \"path\": \"/dev/loop754\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 755,\n \"path\": \"/dev/loop755\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 756,\n \"path\": \"/dev/loop756\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 757,\n \"path\": \"/dev/loop757\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 758,\n \"path\": \"/dev/loop758\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 759,\n \"path\": \"/dev/loop759\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 760,\n \"path\": \"/dev/loop760\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 761,\n \"path\": \"/dev/loop761\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 762,\n \"path\": \"/dev/loop762\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 763,\n \"path\": \"/dev/loop763\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 764,\n \"path\": \"/dev/loop764\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 765,\n \"path\": \"/dev/loop765\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 766,\n \"path\": \"/dev/loop766\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 767,\n \"path\": \"/dev/loop767\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 768,\n \"path\": \"/dev/loop768\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 769,\n \"path\": \"/dev/loop769\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 770,\n \"path\": \"/dev/loop770\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 771,\n \"path\": \"/dev/loop771\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 772,\n \"path\": \"/dev/loop772\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 773,\n \"path\": \"/dev/loop773\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 774,\n \"path\": \"/dev/loop774\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 775,\n \"path\": \"/dev/loop775\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 776,\n \"path\": \"/dev/loop776\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 777,\n \"path\": \"/dev/loop777\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 778,\n \"path\": \"/dev/loop778\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 779,\n \"path\": \"/dev/loop779\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 780,\n \"path\": \"/dev/loop780\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 781,\n \"path\": \"/dev/loop781\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 782,\n \"path\": \"/dev/loop782\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 783,\n \"path\": \"/dev/loop783\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 784,\n \"path\": \"/dev/loop784\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 785,\n \"path\": \"/dev/loop785\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 786,\n \"path\": \"/dev/loop786\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 787,\n \"path\": \"/dev/loop787\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 788,\n \"path\": \"/dev/loop788\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 789,\n \"path\": \"/dev/loop789\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 790,\n \"path\": \"/dev/loop790\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 791,\n \"path\": \"/dev/loop791\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 792,\n \"path\": \"/dev/loop792\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 793,\n \"path\": \"/dev/loop793\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 794,\n \"path\": \"/dev/loop794\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 795,\n \"path\": \"/dev/loop795\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 796,\n \"path\": \"/dev/loop796\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 797,\n \"path\": \"/dev/loop797\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 798,\n \"path\": \"/dev/loop798\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 799,\n \"path\": \"/dev/loop799\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 800,\n \"path\": \"/dev/loop800\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 801,\n \"path\": \"/dev/loop801\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 802,\n \"path\": \"/dev/loop802\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 803,\n \"path\": \"/dev/loop803\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 804,\n \"path\": \"/dev/loop804\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 805,\n \"path\": \"/dev/loop805\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 806,\n \"path\": \"/dev/loop806\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 807,\n \"path\": \"/dev/loop807\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 808,\n \"path\": \"/dev/loop808\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 809,\n \"path\": \"/dev/loop809\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 810,\n \"path\": \"/dev/loop810\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 811,\n \"path\": \"/dev/loop811\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 812,\n \"path\": \"/dev/loop812\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 813,\n \"path\": \"/dev/loop813\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 814,\n \"path\": \"/dev/loop814\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 815,\n \"path\": \"/dev/loop815\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 816,\n \"path\": \"/dev/loop816\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 817,\n \"path\": \"/dev/loop817\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 818,\n \"path\": \"/dev/loop818\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 819,\n \"path\": \"/dev/loop819\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 820,\n \"path\": \"/dev/loop820\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 821,\n \"path\": \"/dev/loop821\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 822,\n \"path\": \"/dev/loop822\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 823,\n \"path\": \"/dev/loop823\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 824,\n \"path\": \"/dev/loop824\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 825,\n \"path\": \"/dev/loop825\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 826,\n \"path\": \"/dev/loop826\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 827,\n \"path\": \"/dev/loop827\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 828,\n \"path\": \"/dev/loop828\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 829,\n \"path\": \"/dev/loop829\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 830,\n \"path\": \"/dev/loop830\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 831,\n \"path\": \"/dev/loop831\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 832,\n \"path\": \"/dev/loop832\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 833,\n \"path\": \"/dev/loop833\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 834,\n \"path\": \"/dev/loop834\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 835,\n \"path\": \"/dev/loop835\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 836,\n \"path\": \"/dev/loop836\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 837,\n \"path\": \"/dev/loop837\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 838,\n \"path\": \"/dev/loop838\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 839,\n \"path\": \"/dev/loop839\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 840,\n \"path\": \"/dev/loop840\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 841,\n \"path\": \"/dev/loop841\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 842,\n \"path\": \"/dev/loop842\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 843,\n \"path\": \"/dev/loop843\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 844,\n \"path\": \"/dev/loop844\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 845,\n \"path\": \"/dev/loop845\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 846,\n \"path\": \"/dev/loop846\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 847,\n \"path\": \"/dev/loop847\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 848,\n \"path\": \"/dev/loop848\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 849,\n \"path\": \"/dev/loop849\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 850,\n \"path\": \"/dev/loop850\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 851,\n \"path\": \"/dev/loop851\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 852,\n \"path\": \"/dev/loop852\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 853,\n \"path\": \"/dev/loop853\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 854,\n \"path\": \"/dev/loop854\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 855,\n \"path\": \"/dev/loop855\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 856,\n \"path\": \"/dev/loop856\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 857,\n \"path\": \"/dev/loop857\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 858,\n \"path\": \"/dev/loop858\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 859,\n \"path\": \"/dev/loop859\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 860,\n \"path\": \"/dev/loop860\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 861,\n \"path\": \"/dev/loop861\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 862,\n \"path\": \"/dev/loop862\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 863,\n \"path\": \"/dev/loop863\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 864,\n \"path\": \"/dev/loop864\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 865,\n \"path\": \"/dev/loop865\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 866,\n \"path\": \"/dev/loop866\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 867,\n \"path\": \"/dev/loop867\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 868,\n \"path\": \"/dev/loop868\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 869,\n \"path\": \"/dev/loop869\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 870,\n \"path\": \"/dev/loop870\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 871,\n \"path\": \"/dev/loop871\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 872,\n \"path\": \"/dev/loop872\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 873,\n \"path\": \"/dev/loop873\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 874,\n \"path\": \"/dev/loop874\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 875,\n \"path\": \"/dev/loop875\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 876,\n \"path\": \"/dev/loop876\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 877,\n \"path\": \"/dev/loop877\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 878,\n \"path\": \"/dev/loop878\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 879,\n \"path\": \"/dev/loop879\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 880,\n \"path\": \"/dev/loop880\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 881,\n \"path\": \"/dev/loop881\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 882,\n \"path\": \"/dev/loop882\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 883,\n \"path\": \"/dev/loop883\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 884,\n \"path\": \"/dev/loop884\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 885,\n \"path\": \"/dev/loop885\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 886,\n \"path\": \"/dev/loop886\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 887,\n \"path\": \"/dev/loop887\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 888,\n \"path\": \"/dev/loop888\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 889,\n \"path\": \"/dev/loop889\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 890,\n \"path\": \"/dev/loop890\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 891,\n \"path\": \"/dev/loop891\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 892,\n \"path\": \"/dev/loop892\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 893,\n \"path\": \"/dev/loop893\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 894,\n \"path\": \"/dev/loop894\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 895,\n \"path\": \"/dev/loop895\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 896,\n \"path\": \"/dev/loop896\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 897,\n \"path\": \"/dev/loop897\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 898,\n \"path\": \"/dev/loop898\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 899,\n \"path\": \"/dev/loop899\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 900,\n \"path\": \"/dev/loop900\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 901,\n \"path\": \"/dev/loop901\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 902,\n \"path\": \"/dev/loop902\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 903,\n \"path\": \"/dev/loop903\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 904,\n \"path\": \"/dev/loop904\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 905,\n \"path\": \"/dev/loop905\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 906,\n \"path\": \"/dev/loop906\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 907,\n \"path\": \"/dev/loop907\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 908,\n \"path\": \"/dev/loop908\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 909,\n \"path\": \"/dev/loop909\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 910,\n \"path\": \"/dev/loop910\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 911,\n \"path\": \"/dev/loop911\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 912,\n \"path\": \"/dev/loop912\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 913,\n \"path\": \"/dev/loop913\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 914,\n \"path\": \"/dev/loop914\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 915,\n \"path\": \"/dev/loop915\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 916,\n \"path\": \"/dev/loop916\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 917,\n \"path\": \"/dev/loop917\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 918,\n \"path\": \"/dev/loop918\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 919,\n \"path\": \"/dev/loop919\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 920,\n \"path\": \"/dev/loop920\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 921,\n \"path\": \"/dev/loop921\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 922,\n \"path\": \"/dev/loop922\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 923,\n \"path\": \"/dev/loop923\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 924,\n \"path\": \"/dev/loop924\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 925,\n \"path\": \"/dev/loop925\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 926,\n \"path\": \"/dev/loop926\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 927,\n \"path\": \"/dev/loop927\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 928,\n \"path\": \"/dev/loop928\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 929,\n \"path\": \"/dev/loop929\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 930,\n \"path\": \"/dev/loop930\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 931,\n \"path\": \"/dev/loop931\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 932,\n \"path\": \"/dev/loop932\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 933,\n \"path\": \"/dev/loop933\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 934,\n \"path\": \"/dev/loop934\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 935,\n \"path\": \"/dev/loop935\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 936,\n \"path\": \"/dev/loop936\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 937,\n \"path\": \"/dev/loop937\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 938,\n \"path\": \"/dev/loop938\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 939,\n \"path\": \"/dev/loop939\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 940,\n \"path\": \"/dev/loop940\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 941,\n \"path\": \"/dev/loop941\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 942,\n \"path\": \"/dev/loop942\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 943,\n \"path\": \"/dev/loop943\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 944,\n \"path\": \"/dev/loop944\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 945,\n \"path\": \"/dev/loop945\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 946,\n \"path\": \"/dev/loop946\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 947,\n \"path\": \"/dev/loop947\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 948,\n \"path\": \"/dev/loop948\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 949,\n \"path\": \"/dev/loop949\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 950,\n \"path\": \"/dev/loop950\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 951,\n \"path\": \"/dev/loop951\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 952,\n \"path\": \"/dev/loop952\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 953,\n \"path\": \"/dev/loop953\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 954,\n \"path\": \"/dev/loop954\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 955,\n \"path\": \"/dev/loop955\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 956,\n \"path\": \"/dev/loop956\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 957,\n \"path\": \"/dev/loop957\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 958,\n \"path\": \"/dev/loop958\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 959,\n \"path\": \"/dev/loop959\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 960,\n \"path\": \"/dev/loop960\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 961,\n \"path\": \"/dev/loop961\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 962,\n \"path\": \"/dev/loop962\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 963,\n \"path\": \"/dev/loop963\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 964,\n \"path\": \"/dev/loop964\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 965,\n \"path\": \"/dev/loop965\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 966,\n \"path\": \"/dev/loop966\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 967,\n \"path\": \"/dev/loop967\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 968,\n \"path\": \"/dev/loop968\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 969,\n \"path\": \"/dev/loop969\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 970,\n \"path\": \"/dev/loop970\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 971,\n \"path\": \"/dev/loop971\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 972,\n \"path\": \"/dev/loop972\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 973,\n \"path\": \"/dev/loop973\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 974,\n \"path\": \"/dev/loop974\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 975,\n \"path\": \"/dev/loop975\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 976,\n \"path\": \"/dev/loop976\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 977,\n \"path\": \"/dev/loop977\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 978,\n \"path\": \"/dev/loop978\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 979,\n \"path\": \"/dev/loop979\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 980,\n \"path\": \"/dev/loop980\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 981,\n \"path\": \"/dev/loop981\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 982,\n \"path\": \"/dev/loop982\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 983,\n \"path\": \"/dev/loop983\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 984,\n \"path\": \"/dev/loop984\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 985,\n \"path\": \"/dev/loop985\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 986,\n \"path\": \"/dev/loop986\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 987,\n \"path\": \"/dev/loop987\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 988,\n \"path\": \"/dev/loop988\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 989,\n \"path\": \"/dev/loop989\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 990,\n \"path\": \"/dev/loop990\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 991,\n \"path\": \"/dev/loop991\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 992,\n \"path\": \"/dev/loop992\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 993,\n \"path\": \"/dev/loop993\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 994,\n \"path\": \"/dev/loop994\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 995,\n \"path\": \"/dev/loop995\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 996,\n \"path\": \"/dev/loop996\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 997,\n \"path\": \"/dev/loop997\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 998,\n \"path\": \"/dev/loop998\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 999,\n \"path\": \"/dev/loop999\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"path\": \"/proc/2433075/ns/pid\",\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2433075/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2433075/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2433075/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/proc\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/host\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/run/systemd/\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/run/systemd\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker\",\n \"CRI_VERSION=v1.32.0\",\n \"RUNC_VERSION=v1.2.6\",\n \"NCTL_VERSION=2.0.4\",\n \"CTR_VERSION=2.0.4\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5\",\n \"snapshotKey\": \"e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:00:06.835070769Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/lfncnti/cluster-tools:v1.0.8\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-htvs5\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"1939cf89-d6e6-483b-8a73-dbb0f735baeb\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_cluster-tools-htvs5_1939cf89-d6e6-483b-8a73-dbb0f735baeb/cluster-tools/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/run/systemd/\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/systemd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/proc\",\n \"gidMappings\": [],\n \"hostPath\": \"/proc\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/host\",\n \"gidMappings\": [],\n \"hostPath\": \"/\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:00:07.211005291Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:23Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:23Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:23] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" } ], "image": { "image": "sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f", "user_specified_image": "lfncnti/cluster-tools:v1.0.8" }, "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-htvs5", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "1939cf89-d6e6-483b-8a73-dbb0f735baeb" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 2 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "cluster-tools/0.log", "metadata": { "name": "cluster-tools" }, "mounts": [ { "container_path": "/run/systemd/", "host_path": "/run/systemd", "readonly": true }, { "container_path": "/proc", "host_path": "/proc" }, { "container_path": "/host", "host_path": "/" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536" } ] }, "pid": 2433100, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "cluster-tools", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "lfncnti/cluster-tools:v1.0.8", "io.kubernetes.cri.sandbox-id": "95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5", "io.kubernetes.cri.sandbox-name": "cluster-tools-htvs5", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "1939cf89-d6e6-483b-8a73-dbb0f735baeb" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod1939cf89_d6e6_483b_8a73_dbb0f735baeb.slice:cri-containerd:e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 1000, "path": "/dev/loop1000", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 128, "path": "/dev/loop128", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 129, "path": "/dev/loop129", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 130, "path": "/dev/loop130", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 131, "path": "/dev/loop131", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 132, "path": "/dev/loop132", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 133, "path": "/dev/loop133", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 134, "path": "/dev/loop134", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 135, "path": "/dev/loop135", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 136, "path": "/dev/loop136", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 137, "path": "/dev/loop137", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 138, "path": "/dev/loop138", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 139, "path": "/dev/loop139", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 140, "path": "/dev/loop140", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 141, "path": "/dev/loop141", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 142, "path": "/dev/loop142", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 143, "path": "/dev/loop143", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 144, "path": "/dev/loop144", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 145, "path": "/dev/loop145", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 146, "path": "/dev/loop146", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 147, "path": "/dev/loop147", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 148, "path": "/dev/loop148", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 149, "path": "/dev/loop149", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 150, "path": "/dev/loop150", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 151, "path": "/dev/loop151", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 152, "path": "/dev/loop152", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 153, "path": "/dev/loop153", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 154, "path": "/dev/loop154", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 155, "path": "/dev/loop155", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 156, "path": "/dev/loop156", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 157, "path": "/dev/loop157", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 158, "path": "/dev/loop158", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 159, "path": "/dev/loop159", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 160, "path": "/dev/loop160", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 161, "path": "/dev/loop161", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 162, "path": "/dev/loop162", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 163, "path": "/dev/loop163", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 164, "path": "/dev/loop164", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 165, "path": "/dev/loop165", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 166, "path": "/dev/loop166", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 167, "path": "/dev/loop167", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 168, "path": "/dev/loop168", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 169, "path": "/dev/loop169", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 170, "path": "/dev/loop170", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 171, "path": "/dev/loop171", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 172, "path": "/dev/loop172", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 173, "path": "/dev/loop173", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 174, "path": "/dev/loop174", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 175, "path": "/dev/loop175", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 176, "path": "/dev/loop176", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 177, "path": "/dev/loop177", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 178, "path": "/dev/loop178", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 179, "path": "/dev/loop179", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 180, "path": "/dev/loop180", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 181, "path": "/dev/loop181", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 182, "path": "/dev/loop182", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 183, "path": "/dev/loop183", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 184, "path": "/dev/loop184", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 185, "path": "/dev/loop185", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 186, "path": "/dev/loop186", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 187, "path": "/dev/loop187", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 188, "path": "/dev/loop188", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 189, "path": "/dev/loop189", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 190, "path": "/dev/loop190", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 191, "path": "/dev/loop191", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 192, "path": "/dev/loop192", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 193, "path": "/dev/loop193", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 194, "path": "/dev/loop194", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 195, "path": "/dev/loop195", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 196, "path": "/dev/loop196", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 197, "path": "/dev/loop197", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 198, "path": "/dev/loop198", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 199, "path": "/dev/loop199", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 200, "path": "/dev/loop200", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 201, "path": "/dev/loop201", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 202, "path": "/dev/loop202", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 203, "path": "/dev/loop203", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 204, "path": "/dev/loop204", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 205, "path": "/dev/loop205", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 206, "path": "/dev/loop206", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 207, "path": "/dev/loop207", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 208, "path": "/dev/loop208", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 209, "path": "/dev/loop209", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 210, "path": "/dev/loop210", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 211, "path": "/dev/loop211", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 212, "path": "/dev/loop212", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 213, "path": "/dev/loop213", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 214, "path": "/dev/loop214", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 215, "path": "/dev/loop215", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 216, "path": "/dev/loop216", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 217, "path": "/dev/loop217", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 218, "path": "/dev/loop218", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 219, "path": "/dev/loop219", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 220, "path": "/dev/loop220", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 221, "path": "/dev/loop221", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 222, "path": "/dev/loop222", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 223, "path": "/dev/loop223", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 224, "path": "/dev/loop224", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 225, "path": "/dev/loop225", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 226, "path": "/dev/loop226", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 227, "path": "/dev/loop227", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 228, "path": "/dev/loop228", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 229, "path": "/dev/loop229", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 230, "path": "/dev/loop230", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 231, "path": "/dev/loop231", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 232, "path": "/dev/loop232", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 233, "path": "/dev/loop233", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 234, "path": "/dev/loop234", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 235, "path": "/dev/loop235", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 236, "path": "/dev/loop236", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 237, "path": "/dev/loop237", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 238, "path": "/dev/loop238", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 239, "path": "/dev/loop239", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 240, "path": "/dev/loop240", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 241, "path": "/dev/loop241", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 242, "path": "/dev/loop242", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 243, "path": "/dev/loop243", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 244, "path": "/dev/loop244", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 245, "path": "/dev/loop245", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 246, "path": "/dev/loop246", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 247, "path": "/dev/loop247", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 248, "path": "/dev/loop248", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 249, "path": "/dev/loop249", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 250, "path": "/dev/loop250", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 251, "path": "/dev/loop251", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 252, "path": "/dev/loop252", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 253, "path": "/dev/loop253", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 254, "path": "/dev/loop254", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 255, "path": "/dev/loop255", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 256, "path": "/dev/loop256", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 257, "path": "/dev/loop257", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 258, "path": "/dev/loop258", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 259, "path": "/dev/loop259", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 260, "path": "/dev/loop260", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 261, "path": "/dev/loop261", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 262, "path": "/dev/loop262", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 263, "path": "/dev/loop263", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 264, "path": "/dev/loop264", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 265, "path": "/dev/loop265", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 266, "path": "/dev/loop266", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 267, "path": "/dev/loop267", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 268, "path": "/dev/loop268", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 269, "path": "/dev/loop269", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 270, "path": "/dev/loop270", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 271, "path": "/dev/loop271", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 272, "path": "/dev/loop272", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 273, "path": "/dev/loop273", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 274, "path": "/dev/loop274", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 275, "path": "/dev/loop275", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 276, "path": "/dev/loop276", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 277, "path": "/dev/loop277", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 278, "path": "/dev/loop278", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 279, "path": "/dev/loop279", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 280, "path": "/dev/loop280", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 281, "path": "/dev/loop281", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 282, "path": "/dev/loop282", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 283, "path": "/dev/loop283", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 284, "path": "/dev/loop284", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 285, "path": "/dev/loop285", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 286, "path": "/dev/loop286", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 287, "path": "/dev/loop287", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 288, "path": "/dev/loop288", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 289, "path": "/dev/loop289", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 290, "path": "/dev/loop290", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 291, "path": "/dev/loop291", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 292, "path": "/dev/loop292", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 293, "path": "/dev/loop293", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 294, "path": "/dev/loop294", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 295, "path": "/dev/loop295", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 296, "path": "/dev/loop296", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 297, "path": "/dev/loop297", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 298, "path": "/dev/loop298", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 299, "path": "/dev/loop299", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 300, "path": "/dev/loop300", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 301, "path": "/dev/loop301", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 302, "path": "/dev/loop302", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 303, "path": "/dev/loop303", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 304, "path": "/dev/loop304", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 305, "path": "/dev/loop305", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 306, "path": "/dev/loop306", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 307, "path": "/dev/loop307", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 308, "path": "/dev/loop308", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 309, "path": "/dev/loop309", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 310, "path": "/dev/loop310", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 311, "path": "/dev/loop311", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 312, "path": "/dev/loop312", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 313, "path": "/dev/loop313", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 314, "path": "/dev/loop314", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 315, "path": "/dev/loop315", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 316, "path": "/dev/loop316", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 317, "path": "/dev/loop317", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 318, "path": "/dev/loop318", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 319, "path": "/dev/loop319", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 320, "path": "/dev/loop320", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 321, "path": "/dev/loop321", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 322, "path": "/dev/loop322", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 323, "path": "/dev/loop323", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 324, "path": "/dev/loop324", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 325, "path": "/dev/loop325", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 326, "path": "/dev/loop326", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 327, "path": "/dev/loop327", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 328, "path": "/dev/loop328", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 329, "path": "/dev/loop329", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 330, "path": "/dev/loop330", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 331, "path": "/dev/loop331", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 332, "path": "/dev/loop332", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 333, "path": "/dev/loop333", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 334, "path": "/dev/loop334", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 335, "path": "/dev/loop335", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 336, "path": "/dev/loop336", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 337, "path": "/dev/loop337", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 338, "path": "/dev/loop338", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 339, "path": "/dev/loop339", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 340, "path": "/dev/loop340", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 341, "path": "/dev/loop341", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 342, "path": "/dev/loop342", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 343, "path": "/dev/loop343", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 344, "path": "/dev/loop344", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 345, "path": "/dev/loop345", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 346, "path": "/dev/loop346", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 347, "path": "/dev/loop347", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 348, "path": "/dev/loop348", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 349, "path": "/dev/loop349", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 350, "path": "/dev/loop350", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 351, "path": "/dev/loop351", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 352, "path": "/dev/loop352", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 353, "path": "/dev/loop353", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 354, "path": "/dev/loop354", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 355, "path": "/dev/loop355", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 356, "path": "/dev/loop356", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 357, "path": "/dev/loop357", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 358, "path": "/dev/loop358", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 359, "path": "/dev/loop359", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 360, "path": "/dev/loop360", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 361, "path": "/dev/loop361", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 362, "path": "/dev/loop362", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 363, "path": "/dev/loop363", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 364, "path": "/dev/loop364", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 365, "path": "/dev/loop365", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 366, "path": "/dev/loop366", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 367, "path": "/dev/loop367", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 368, "path": "/dev/loop368", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 369, "path": "/dev/loop369", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 370, "path": "/dev/loop370", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 371, "path": "/dev/loop371", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 372, "path": "/dev/loop372", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 373, "path": "/dev/loop373", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 374, "path": "/dev/loop374", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 375, "path": "/dev/loop375", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 376, "path": "/dev/loop376", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 377, "path": "/dev/loop377", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 378, "path": "/dev/loop378", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 379, "path": "/dev/loop379", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 380, "path": "/dev/loop380", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 381, "path": "/dev/loop381", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 382, "path": "/dev/loop382", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 383, "path": "/dev/loop383", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 384, "path": "/dev/loop384", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 385, "path": "/dev/loop385", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 386, "path": "/dev/loop386", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 387, "path": "/dev/loop387", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 388, "path": "/dev/loop388", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 389, "path": "/dev/loop389", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 390, "path": "/dev/loop390", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 391, "path": "/dev/loop391", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 392, "path": "/dev/loop392", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 393, "path": "/dev/loop393", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 394, "path": "/dev/loop394", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 395, "path": "/dev/loop395", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 396, "path": "/dev/loop396", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 397, "path": "/dev/loop397", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 398, "path": "/dev/loop398", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 399, "path": "/dev/loop399", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 400, "path": "/dev/loop400", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 401, "path": "/dev/loop401", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 402, "path": "/dev/loop402", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 403, "path": "/dev/loop403", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 404, "path": "/dev/loop404", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 405, "path": "/dev/loop405", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 406, "path": "/dev/loop406", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 407, "path": "/dev/loop407", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 408, "path": "/dev/loop408", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 409, "path": "/dev/loop409", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 410, "path": "/dev/loop410", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 411, "path": "/dev/loop411", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 412, "path": "/dev/loop412", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 413, "path": "/dev/loop413", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 414, "path": "/dev/loop414", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 415, "path": "/dev/loop415", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 416, "path": "/dev/loop416", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 417, "path": "/dev/loop417", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 418, "path": "/dev/loop418", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 419, "path": "/dev/loop419", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 420, "path": "/dev/loop420", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 421, "path": "/dev/loop421", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 422, "path": "/dev/loop422", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 423, "path": "/dev/loop423", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 424, "path": "/dev/loop424", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 425, "path": "/dev/loop425", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 426, "path": "/dev/loop426", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 427, "path": "/dev/loop427", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 428, "path": "/dev/loop428", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 429, "path": "/dev/loop429", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 430, "path": "/dev/loop430", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 431, "path": "/dev/loop431", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 432, "path": "/dev/loop432", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 433, "path": "/dev/loop433", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 434, "path": "/dev/loop434", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 435, "path": "/dev/loop435", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 436, "path": "/dev/loop436", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 437, "path": "/dev/loop437", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 438, "path": "/dev/loop438", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 439, "path": "/dev/loop439", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 440, "path": "/dev/loop440", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 441, "path": "/dev/loop441", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 442, "path": "/dev/loop442", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 443, "path": "/dev/loop443", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 444, "path": "/dev/loop444", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 445, "path": "/dev/loop445", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 446, "path": "/dev/loop446", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 447, "path": "/dev/loop447", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 448, "path": "/dev/loop448", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 449, "path": "/dev/loop449", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 450, "path": "/dev/loop450", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 451, "path": "/dev/loop451", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 452, "path": "/dev/loop452", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 453, "path": "/dev/loop453", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 454, "path": "/dev/loop454", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 455, "path": "/dev/loop455", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 456, "path": "/dev/loop456", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 457, "path": "/dev/loop457", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 458, "path": "/dev/loop458", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 459, "path": "/dev/loop459", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 460, "path": "/dev/loop460", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 461, "path": "/dev/loop461", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 462, "path": "/dev/loop462", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 463, "path": "/dev/loop463", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 464, "path": "/dev/loop464", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 465, "path": "/dev/loop465", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 466, "path": "/dev/loop466", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 467, "path": "/dev/loop467", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 468, "path": "/dev/loop468", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 469, "path": "/dev/loop469", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 470, "path": "/dev/loop470", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 471, "path": "/dev/loop471", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 472, "path": "/dev/loop472", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 473, "path": "/dev/loop473", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 474, "path": "/dev/loop474", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 475, "path": "/dev/loop475", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 476, "path": "/dev/loop476", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 477, "path": "/dev/loop477", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 478, "path": "/dev/loop478", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 479, "path": "/dev/loop479", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 480, "path": "/dev/loop480", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 481, "path": "/dev/loop481", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 482, "path": "/dev/loop482", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 483, "path": "/dev/loop483", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 484, "path": "/dev/loop484", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 485, "path": "/dev/loop485", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 486, "path": "/dev/loop486", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 487, "path": "/dev/loop487", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 488, "path": "/dev/loop488", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 489, "path": "/dev/loop489", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 490, "path": "/dev/loop490", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 491, "path": "/dev/loop491", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 492, "path": "/dev/loop492", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 493, "path": "/dev/loop493", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 494, "path": "/dev/loop494", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 495, "path": "/dev/loop495", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 496, "path": "/dev/loop496", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 497, "path": "/dev/loop497", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 498, "path": "/dev/loop498", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 499, "path": "/dev/loop499", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 500, "path": "/dev/loop500", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 501, "path": "/dev/loop501", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 502, "path": "/dev/loop502", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 503, "path": "/dev/loop503", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 504, "path": "/dev/loop504", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 505, "path": "/dev/loop505", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 506, "path": "/dev/loop506", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 507, "path": "/dev/loop507", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 508, "path": "/dev/loop508", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 509, "path": "/dev/loop509", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 510, "path": "/dev/loop510", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 511, "path": "/dev/loop511", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 512, "path": "/dev/loop512", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 513, "path": "/dev/loop513", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 514, "path": "/dev/loop514", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 515, "path": "/dev/loop515", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 516, "path": "/dev/loop516", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 517, "path": "/dev/loop517", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 518, "path": "/dev/loop518", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 519, "path": "/dev/loop519", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 520, "path": "/dev/loop520", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 521, "path": "/dev/loop521", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 522, "path": "/dev/loop522", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 523, "path": "/dev/loop523", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 524, "path": "/dev/loop524", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 525, "path": "/dev/loop525", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 526, "path": "/dev/loop526", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 527, "path": "/dev/loop527", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 528, "path": "/dev/loop528", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 529, "path": "/dev/loop529", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 530, "path": "/dev/loop530", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 531, "path": "/dev/loop531", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 532, "path": "/dev/loop532", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 533, "path": "/dev/loop533", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 534, "path": "/dev/loop534", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 535, "path": "/dev/loop535", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 536, "path": "/dev/loop536", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 537, "path": "/dev/loop537", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 538, "path": "/dev/loop538", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 539, "path": "/dev/loop539", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 540, "path": "/dev/loop540", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 541, "path": "/dev/loop541", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 542, "path": "/dev/loop542", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 543, "path": "/dev/loop543", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 544, "path": "/dev/loop544", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 545, "path": "/dev/loop545", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 546, "path": "/dev/loop546", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 547, "path": "/dev/loop547", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 548, "path": "/dev/loop548", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 549, "path": "/dev/loop549", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 550, "path": "/dev/loop550", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 551, "path": "/dev/loop551", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 552, "path": "/dev/loop552", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 553, "path": "/dev/loop553", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 554, "path": "/dev/loop554", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 555, "path": "/dev/loop555", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 556, "path": "/dev/loop556", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 557, "path": "/dev/loop557", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 558, "path": "/dev/loop558", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 559, "path": "/dev/loop559", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 560, "path": "/dev/loop560", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 561, "path": "/dev/loop561", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 562, "path": "/dev/loop562", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 563, "path": "/dev/loop563", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 564, "path": "/dev/loop564", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 565, "path": "/dev/loop565", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 566, "path": "/dev/loop566", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 567, "path": "/dev/loop567", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 568, "path": "/dev/loop568", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 569, "path": "/dev/loop569", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 570, "path": "/dev/loop570", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 571, "path": "/dev/loop571", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 572, "path": "/dev/loop572", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 573, "path": "/dev/loop573", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 574, "path": "/dev/loop574", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 575, "path": "/dev/loop575", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 576, "path": "/dev/loop576", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 577, "path": "/dev/loop577", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 578, "path": "/dev/loop578", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 579, "path": "/dev/loop579", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 580, "path": "/dev/loop580", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 581, "path": "/dev/loop581", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 582, "path": "/dev/loop582", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 583, "path": "/dev/loop583", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 584, "path": "/dev/loop584", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 585, "path": "/dev/loop585", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 586, "path": "/dev/loop586", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 587, "path": "/dev/loop587", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 588, "path": "/dev/loop588", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 589, "path": "/dev/loop589", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 590, "path": "/dev/loop590", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 591, "path": "/dev/loop591", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 592, "path": "/dev/loop592", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 593, "path": "/dev/loop593", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 594, "path": "/dev/loop594", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 595, "path": "/dev/loop595", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 596, "path": "/dev/loop596", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 597, "path": "/dev/loop597", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 598, "path": "/dev/loop598", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 599, "path": "/dev/loop599", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 600, "path": "/dev/loop600", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 601, "path": "/dev/loop601", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 602, "path": "/dev/loop602", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 603, "path": "/dev/loop603", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 604, "path": "/dev/loop604", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 605, "path": "/dev/loop605", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 606, "path": "/dev/loop606", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 607, "path": "/dev/loop607", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 608, "path": "/dev/loop608", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 609, "path": "/dev/loop609", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 610, "path": "/dev/loop610", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 611, "path": "/dev/loop611", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 612, "path": "/dev/loop612", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 613, "path": "/dev/loop613", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 614, "path": "/dev/loop614", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 615, "path": "/dev/loop615", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 616, "path": "/dev/loop616", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 617, "path": "/dev/loop617", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 618, "path": "/dev/loop618", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 619, "path": "/dev/loop619", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 620, "path": "/dev/loop620", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 621, "path": "/dev/loop621", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 622, "path": "/dev/loop622", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 623, "path": "/dev/loop623", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 624, "path": "/dev/loop624", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 625, "path": "/dev/loop625", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 626, "path": "/dev/loop626", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 627, "path": "/dev/loop627", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 628, "path": "/dev/loop628", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 629, "path": "/dev/loop629", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 630, "path": "/dev/loop630", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 631, "path": "/dev/loop631", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 632, "path": "/dev/loop632", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 633, "path": "/dev/loop633", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 634, "path": "/dev/loop634", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 635, "path": "/dev/loop635", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 636, "path": "/dev/loop636", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 637, "path": "/dev/loop637", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 638, "path": "/dev/loop638", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 639, "path": "/dev/loop639", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 640, "path": "/dev/loop640", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 641, "path": "/dev/loop641", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 642, "path": "/dev/loop642", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 643, "path": "/dev/loop643", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 644, "path": "/dev/loop644", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 645, "path": "/dev/loop645", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 646, "path": "/dev/loop646", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 647, "path": "/dev/loop647", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 648, "path": "/dev/loop648", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 649, "path": "/dev/loop649", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 650, "path": "/dev/loop650", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 651, "path": "/dev/loop651", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 652, "path": "/dev/loop652", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 653, "path": "/dev/loop653", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 654, "path": "/dev/loop654", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 655, "path": "/dev/loop655", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 656, "path": "/dev/loop656", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 657, "path": "/dev/loop657", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 658, "path": "/dev/loop658", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 659, "path": "/dev/loop659", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 660, "path": "/dev/loop660", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 661, "path": "/dev/loop661", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 662, "path": "/dev/loop662", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 663, "path": "/dev/loop663", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 664, "path": "/dev/loop664", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 665, "path": "/dev/loop665", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 666, "path": "/dev/loop666", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 667, "path": "/dev/loop667", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 668, "path": "/dev/loop668", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 669, "path": "/dev/loop669", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 670, "path": "/dev/loop670", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 671, "path": "/dev/loop671", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 672, "path": "/dev/loop672", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 673, "path": "/dev/loop673", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 674, "path": "/dev/loop674", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 675, "path": "/dev/loop675", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 676, "path": "/dev/loop676", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 677, "path": "/dev/loop677", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 678, "path": "/dev/loop678", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 679, "path": "/dev/loop679", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 680, "path": "/dev/loop680", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 681, "path": "/dev/loop681", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 682, "path": "/dev/loop682", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 683, "path": "/dev/loop683", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 684, "path": "/dev/loop684", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 685, "path": "/dev/loop685", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 686, "path": "/dev/loop686", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 687, "path": "/dev/loop687", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 688, "path": "/dev/loop688", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 689, "path": "/dev/loop689", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 690, "path": "/dev/loop690", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 691, "path": "/dev/loop691", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 692, "path": "/dev/loop692", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 693, "path": "/dev/loop693", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 694, "path": "/dev/loop694", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 695, "path": "/dev/loop695", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 696, "path": "/dev/loop696", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 697, "path": "/dev/loop697", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 698, "path": "/dev/loop698", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 699, "path": "/dev/loop699", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 700, "path": "/dev/loop700", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 701, "path": "/dev/loop701", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 702, "path": "/dev/loop702", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 703, "path": "/dev/loop703", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 704, "path": "/dev/loop704", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 705, "path": "/dev/loop705", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 706, "path": "/dev/loop706", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 707, "path": "/dev/loop707", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 708, "path": "/dev/loop708", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 709, "path": "/dev/loop709", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 710, "path": "/dev/loop710", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 711, "path": "/dev/loop711", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 712, "path": "/dev/loop712", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 713, "path": "/dev/loop713", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 714, "path": "/dev/loop714", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 715, "path": "/dev/loop715", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 716, "path": "/dev/loop716", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 717, "path": "/dev/loop717", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 718, "path": "/dev/loop718", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 719, "path": "/dev/loop719", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 720, "path": "/dev/loop720", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 721, "path": "/dev/loop721", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 722, "path": "/dev/loop722", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 723, "path": "/dev/loop723", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 724, "path": "/dev/loop724", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 725, "path": "/dev/loop725", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 726, "path": "/dev/loop726", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 727, "path": "/dev/loop727", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 728, "path": "/dev/loop728", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 729, "path": "/dev/loop729", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 730, "path": "/dev/loop730", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 731, "path": "/dev/loop731", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 732, "path": "/dev/loop732", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 733, "path": "/dev/loop733", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 734, "path": "/dev/loop734", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 735, "path": "/dev/loop735", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 736, "path": "/dev/loop736", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 737, "path": "/dev/loop737", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 738, "path": "/dev/loop738", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 739, "path": "/dev/loop739", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 740, "path": "/dev/loop740", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 741, "path": "/dev/loop741", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 742, "path": "/dev/loop742", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 743, "path": "/dev/loop743", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 744, "path": "/dev/loop744", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 745, "path": "/dev/loop745", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 746, "path": "/dev/loop746", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 747, "path": "/dev/loop747", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 748, "path": "/dev/loop748", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 749, "path": "/dev/loop749", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 750, "path": "/dev/loop750", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 751, "path": "/dev/loop751", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 752, "path": "/dev/loop752", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 753, "path": "/dev/loop753", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 754, "path": "/dev/loop754", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 755, "path": "/dev/loop755", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 756, "path": "/dev/loop756", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 757, "path": "/dev/loop757", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 758, "path": "/dev/loop758", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 759, "path": "/dev/loop759", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 760, "path": "/dev/loop760", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 761, "path": "/dev/loop761", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 762, "path": "/dev/loop762", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 763, "path": "/dev/loop763", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 764, "path": "/dev/loop764", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 765, "path": "/dev/loop765", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 766, "path": "/dev/loop766", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 767, "path": "/dev/loop767", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 768, "path": "/dev/loop768", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 769, "path": "/dev/loop769", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 770, "path": "/dev/loop770", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 771, "path": "/dev/loop771", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 772, "path": "/dev/loop772", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 773, "path": "/dev/loop773", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 774, "path": "/dev/loop774", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 775, "path": "/dev/loop775", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 776, "path": "/dev/loop776", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 777, "path": "/dev/loop777", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 778, "path": "/dev/loop778", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 779, "path": "/dev/loop779", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 780, "path": "/dev/loop780", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 781, "path": "/dev/loop781", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 782, "path": "/dev/loop782", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 783, "path": "/dev/loop783", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 784, "path": "/dev/loop784", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 785, "path": "/dev/loop785", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 786, "path": "/dev/loop786", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 787, "path": "/dev/loop787", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 788, "path": "/dev/loop788", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 789, "path": "/dev/loop789", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 790, "path": "/dev/loop790", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 791, "path": "/dev/loop791", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 792, "path": "/dev/loop792", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 793, "path": "/dev/loop793", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 794, "path": "/dev/loop794", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 795, "path": "/dev/loop795", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 796, "path": "/dev/loop796", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 797, "path": "/dev/loop797", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 798, "path": "/dev/loop798", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 799, "path": "/dev/loop799", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 800, "path": "/dev/loop800", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 801, "path": "/dev/loop801", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 802, "path": "/dev/loop802", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 803, "path": "/dev/loop803", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 804, "path": "/dev/loop804", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 805, "path": "/dev/loop805", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 806, "path": "/dev/loop806", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 807, "path": "/dev/loop807", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 808, "path": "/dev/loop808", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 809, "path": "/dev/loop809", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 810, "path": "/dev/loop810", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 811, "path": "/dev/loop811", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 812, "path": "/dev/loop812", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 813, "path": "/dev/loop813", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 814, "path": "/dev/loop814", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 815, "path": "/dev/loop815", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 816, "path": "/dev/loop816", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 817, "path": "/dev/loop817", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 818, "path": "/dev/loop818", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 819, "path": "/dev/loop819", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 820, "path": "/dev/loop820", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 821, "path": "/dev/loop821", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 822, "path": "/dev/loop822", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 823, "path": "/dev/loop823", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 824, "path": "/dev/loop824", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 825, "path": "/dev/loop825", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 826, "path": "/dev/loop826", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 827, "path": "/dev/loop827", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 828, "path": "/dev/loop828", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 829, "path": "/dev/loop829", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 830, "path": "/dev/loop830", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 831, "path": "/dev/loop831", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 832, "path": "/dev/loop832", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 833, "path": "/dev/loop833", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 834, "path": "/dev/loop834", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 835, "path": "/dev/loop835", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 836, "path": "/dev/loop836", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 837, "path": "/dev/loop837", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 838, "path": "/dev/loop838", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 839, "path": "/dev/loop839", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 840, "path": "/dev/loop840", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 841, "path": "/dev/loop841", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 842, "path": "/dev/loop842", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 843, "path": "/dev/loop843", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 844, "path": "/dev/loop844", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 845, "path": "/dev/loop845", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 846, "path": "/dev/loop846", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 847, "path": "/dev/loop847", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 848, "path": "/dev/loop848", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 849, "path": "/dev/loop849", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 850, "path": "/dev/loop850", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 851, "path": "/dev/loop851", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 852, "path": "/dev/loop852", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 853, "path": "/dev/loop853", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 854, "path": "/dev/loop854", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 855, "path": "/dev/loop855", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 856, "path": "/dev/loop856", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 857, "path": "/dev/loop857", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 858, "path": "/dev/loop858", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 859, "path": "/dev/loop859", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 860, "path": "/dev/loop860", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 861, "path": "/dev/loop861", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 862, "path": "/dev/loop862", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 863, "path": "/dev/loop863", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 864, "path": "/dev/loop864", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 865, "path": "/dev/loop865", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 866, "path": "/dev/loop866", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 867, "path": "/dev/loop867", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 868, "path": "/dev/loop868", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 869, "path": "/dev/loop869", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 870, "path": "/dev/loop870", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 871, "path": "/dev/loop871", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 872, "path": "/dev/loop872", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 873, "path": "/dev/loop873", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 874, "path": "/dev/loop874", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 875, "path": "/dev/loop875", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 876, "path": "/dev/loop876", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 877, "path": "/dev/loop877", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 878, "path": "/dev/loop878", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 879, "path": "/dev/loop879", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 880, "path": "/dev/loop880", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 881, "path": "/dev/loop881", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 882, "path": "/dev/loop882", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 883, "path": "/dev/loop883", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 884, "path": "/dev/loop884", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 885, "path": "/dev/loop885", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 886, "path": "/dev/loop886", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 887, "path": "/dev/loop887", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 888, "path": "/dev/loop888", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 889, "path": "/dev/loop889", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 890, "path": "/dev/loop890", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 891, "path": "/dev/loop891", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 892, "path": "/dev/loop892", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 893, "path": "/dev/loop893", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 894, "path": "/dev/loop894", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 895, "path": "/dev/loop895", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 896, "path": "/dev/loop896", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 897, "path": "/dev/loop897", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 898, "path": "/dev/loop898", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 899, "path": "/dev/loop899", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 900, "path": "/dev/loop900", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 901, "path": "/dev/loop901", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 902, "path": "/dev/loop902", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 903, "path": "/dev/loop903", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 904, "path": "/dev/loop904", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 905, "path": "/dev/loop905", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 906, "path": "/dev/loop906", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 907, "path": "/dev/loop907", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 908, "path": "/dev/loop908", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 909, "path": "/dev/loop909", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 910, "path": "/dev/loop910", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 911, "path": "/dev/loop911", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 912, "path": "/dev/loop912", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 913, "path": "/dev/loop913", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 914, "path": "/dev/loop914", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 915, "path": "/dev/loop915", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 916, "path": "/dev/loop916", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 917, "path": "/dev/loop917", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 918, "path": "/dev/loop918", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 919, "path": "/dev/loop919", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 920, "path": "/dev/loop920", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 921, "path": "/dev/loop921", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 922, "path": "/dev/loop922", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 923, "path": "/dev/loop923", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 924, "path": "/dev/loop924", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 925, "path": "/dev/loop925", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 926, "path": "/dev/loop926", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 927, "path": "/dev/loop927", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 928, "path": "/dev/loop928", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 929, "path": "/dev/loop929", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 930, "path": "/dev/loop930", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 931, "path": "/dev/loop931", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 932, "path": "/dev/loop932", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 933, "path": "/dev/loop933", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 934, "path": "/dev/loop934", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 935, "path": "/dev/loop935", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 936, "path": "/dev/loop936", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 937, "path": "/dev/loop937", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 938, "path": "/dev/loop938", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 939, "path": "/dev/loop939", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 940, "path": "/dev/loop940", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 941, "path": "/dev/loop941", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 942, "path": "/dev/loop942", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 943, "path": "/dev/loop943", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 944, "path": "/dev/loop944", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 945, "path": "/dev/loop945", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 946, "path": "/dev/loop946", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 947, "path": "/dev/loop947", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 948, "path": "/dev/loop948", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 949, "path": "/dev/loop949", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 950, "path": "/dev/loop950", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 951, "path": "/dev/loop951", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 952, "path": "/dev/loop952", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 953, "path": "/dev/loop953", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 954, "path": "/dev/loop954", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 955, "path": "/dev/loop955", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 956, "path": "/dev/loop956", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 957, "path": "/dev/loop957", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 958, "path": "/dev/loop958", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 959, "path": "/dev/loop959", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 960, "path": "/dev/loop960", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 961, "path": "/dev/loop961", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 962, "path": "/dev/loop962", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 963, "path": "/dev/loop963", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 964, "path": "/dev/loop964", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 965, "path": "/dev/loop965", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 966, "path": "/dev/loop966", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 967, "path": "/dev/loop967", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 968, "path": "/dev/loop968", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 969, "path": "/dev/loop969", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 970, "path": "/dev/loop970", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 971, "path": "/dev/loop971", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 972, "path": "/dev/loop972", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 973, "path": "/dev/loop973", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 974, "path": "/dev/loop974", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 975, "path": "/dev/loop975", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 976, "path": "/dev/loop976", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 977, "path": "/dev/loop977", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 978, "path": "/dev/loop978", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 979, "path": "/dev/loop979", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 980, "path": "/dev/loop980", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 981, "path": "/dev/loop981", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 982, "path": "/dev/loop982", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 983, "path": "/dev/loop983", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 984, "path": "/dev/loop984", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 985, "path": "/dev/loop985", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 986, "path": "/dev/loop986", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 987, "path": "/dev/loop987", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 988, "path": "/dev/loop988", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 989, "path": "/dev/loop989", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 990, "path": "/dev/loop990", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 991, "path": "/dev/loop991", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 992, "path": "/dev/loop992", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 993, "path": "/dev/loop993", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 994, "path": "/dev/loop994", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 995, "path": "/dev/loop995", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 996, "path": "/dev/loop996", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 997, "path": "/dev/loop997", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 998, "path": "/dev/loop998", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 999, "path": "/dev/loop999", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "path": "/proc/2433075/ns/pid", "type": "pid" }, { "path": "/proc/2433075/ns/ipc", "type": "ipc" }, { "path": "/proc/2433075/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2433075/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/proc", "options": [ "rbind", "rprivate", "rw" ], "source": "/proc", "type": "bind" }, { "destination": "/host", "options": [ "rbind", "rprivate", "rw" ], "source": "/", "type": "bind" }, { "destination": "/run/systemd/", "options": [ "rbind", "rprivate", "ro" ], "source": "/run/systemd", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker", "CRI_VERSION=v1.32.0", "RUNC_VERSION=v1.2.6", "NCTL_VERSION=2.0.4", "CTR_VERSION=2.0.4", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "95940389c11a338c8bca8a788a14c7738ca1ff18f46aa2c846b5b0ad97aac6b5", "snapshotKey": "e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:00:06.835070769Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "e2e797d652036ed7e01c47e43394689e117badaec74294d7113eda3ad8fa0236", "image": { "annotations": {}, "image": "docker.io/lfncnti/cluster-tools:v1.0.8", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-htvs5", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "1939cf89-d6e6-483b-8a73-dbb0f735baeb" }, "logPath": "/var/log/pods/cnf-testsuite_cluster-tools-htvs5_1939cf89-d6e6-483b-8a73-dbb0f735baeb/cluster-tools/0.log", "message": "", "metadata": { "attempt": 0, "name": "cluster-tools" }, "mounts": [ { "containerPath": "/run/systemd/", "gidMappings": [], "hostPath": "/run/systemd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/proc", "gidMappings": [], "hostPath": "/proc", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/host", "gidMappings": [], "hostPath": "/", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/volumes/kubernetes.io~projected/kube-api-access-lg7s4", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1939cf89-d6e6-483b-8a73-dbb0f735baeb/containers/cluster-tools/594f0536", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-07-10T12:00:07.211005291Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:23] INFO -- CNTI: node_pid_by_container_id pid: 2433100 [2025-07-10 12:05:23] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:23] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:23] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:23] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:24] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sleep\u0000infinity\u0000", error: ""} [2025-07-10 12:05:24] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:24] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:24] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:24] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:24] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2433100\nNgid:\t0\nPid:\t2433100\nPPid:\t2433050\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2433100\nNSpid:\t2433100\nNSpgid:\t2433100\nNSsid:\t2433100\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t8/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t11\n", error: ""} [2025-07-10 12:05:24] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:24] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-p6skr", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:24] INFO -- CNTI: node_pid_by_container_id container_id: containerd://788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a [2025-07-10 12:05:24] INFO -- CNTI: parse_container_id container_id: containerd://788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a [2025-07-10 12:05:24] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:24] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:24] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:24] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:24] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:24Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:24Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:24] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-7cfb59478c-8bh89\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8bh89,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.139.240\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-8bh89\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"702fba32-c150-49e3-8b70-7a4016b38465\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb\"\n }\n ]\n },\n \"pid\": 2435113,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-7cfb59478c-8bh89\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"702fba32-c150-49e3-8b70-7a4016b38465\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-pod702fba32_c150_49e3_8b70_7a4016b38465.slice:cri-containerd:788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2434989/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2434989/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2434989/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-7cfb59478c-8bh89\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-controller-manager-7cfb59478c-8bh89\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8bh89,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c\",\n \"snapshotKey\": \"788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-07-10T12:05:11.816938722Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-8bh89\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"702fba32-c150-49e3-8b70-7a4016b38465\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-8bh89_702fba32-c150-49e3-8b70-7a4016b38465/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:05:12.036309962Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:24Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:24Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:24] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-controller-manager-7cfb59478c-8bh89" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8bh89,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.139.240:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.139.240:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.139.240" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.139.240" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-8bh89", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "702fba32-c150-49e3-8b70-7a4016b38465" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb" } ] }, "pid": 2435113, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-7cfb59478c-8bh89", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "702fba32-c150-49e3-8b70-7a4016b38465" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-pod702fba32_c150_49e3_8b70_7a4016b38465.slice:cri-containerd:788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2434989/ns/ipc", "type": "ipc" }, { "path": "/proc/2434989/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2434989/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-7cfb59478c-8bh89", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-controller-manager-7cfb59478c-8bh89", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8bh89,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "937a5fad1c4e9864122ce195732e8ac54af604c8cbf0af1b4428f7aa4db35c1c", "snapshotKey": "788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-07-10T12:05:11.816938722Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-8bh89", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "702fba32-c150-49e3-8b70-7a4016b38465" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-8bh89_702fba32-c150-49e3-8b70-7a4016b38465/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/volumes/kubernetes.io~projected/kube-api-access-p6skr", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/702fba32-c150-49e3-8b70-7a4016b38465/containers/manager/f66701eb", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-07-10T12:05:12.036309962Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-07-10 12:05:24] INFO -- CNTI: node_pid_by_container_id pid: 2435113 [2025-07-10 12:05:24] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:25] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:25] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-07-10 12:05:25] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:25] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:25] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:25] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2435113\nNgid:\t0\nPid:\t2435113\nPPid:\t2434932\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2435113\t1\nNSpid:\t2435113\t1\nNSpgid:\t2435113\t1\nNSsid:\t2435113\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 82032 kB\nVmRSS:\t 82032 kB\nRssAnon:\t 32748 kB\nRssFile:\t 49284 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t39\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t676\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-07-10 12:05:25] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:25] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:24:41Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4610422", "uid" => "bf1d7687-7da9-45d4-b8d3-df4acf658300"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:57Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:d4668861cabc1691635d98e827a81cfa834a416f8fe0f4efc609f9f806d86d82", "docker.io/library/docker:dind"], "sizeBytes" => 143701746}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.32.5", "registry.k8s.io/kube-apiserver:v1.32.5"], "sizeBytes" => 98089457}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.32.5", "registry.k8s.io/kube-proxy:v1.32.5"], "sizeBytes" => 95322311}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.32.5", "registry.k8s.io/kube-controller-manager:v1.32.5"], "sizeBytes" => 90814807}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.32.5", "registry.k8s.io/kube-scheduler:v1.32.5"], "sizeBytes" => 70670679}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:2a0b297cc7c4cd376ac7413df339ff2fdaa1ec9d099aed92b5ea1f031ef7f639", "registry.k8s.io/sig-storage/csi-resizer:v1.13.1"], "sizeBytes" => 32400950}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:a399393ff5bd156277c56bae0c08389b1a1b95b7fd6ea44a316ce55e0dd559d7", "registry.k8s.io/sig-storage/csi-attacher:v4.8.0"], "sizeBytes" => 32231444}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:b64f9c8ec79c5dae244ae6608c433bf16c9d4f84248dcba4a6beb2e97b9426d7", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.1"], "sizeBytes" => 17992142}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:d7138bcc3aa5f267403d45ad4292c95397e421ea17a0035888850f424c7de25d", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0"], "sizeBytes" => 14781503}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:84bf6f3e75df53f0e7baf30b85ac6e4a5ad456aa7cf776609134b5917eb4837d", "registry.k8s.io/build-image/distroless-iptables:v0.6.9"], "sizeBytes" => 11529845}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.5", "kubeletVersion" => "v1.32.5", "machineID" => "1112950780464cd4bcf71119fed9194f", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "40b96367-b15c-4fa9-9122-aee3f2a56484"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-07-10T12:05:11Z", "generateName" => "gatekeeper-controller-manager-7cfb59478c-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "7cfb59478c", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-7cfb59478c-8bh89", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-7cfb59478c", "uid" => "185111cb-7686-4460-be0e-7687301e769e"}], "resourceVersion" => "4610626", "uid" => "702fba32-c150-49e3-8b70-7a4016b38465"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-p6skr", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-p6skr", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-p6skr", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.6", "podIPs" => [{"ip" => "10.244.1.6"}], "qosClass" => "Burstable", "startTime" => "2025-07-10T12:05:11Z"}}, container_status: {"containerID" => "containerd://788849eec3f76130927f371537957516f62251e1ddf5b1416b78fa1a392dab9a", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-p6skr", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2435113\nNgid:\t0\nPid:\t2435113\nPPid:\t2434932\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2435113\t1\nNSpid:\t2435113\t1\nNSpgid:\t2435113\t1\nNSsid:\t2435113\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 82032 kB\nVmRSS:\t 82032 kB\nRssAnon:\t 32748 kB\nRssFile:\t 49284 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t39\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t676\nnonvoluntary_ctxt_switches:\t9\n", pid: "2435113", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-07-10 12:05:25] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-f2hnh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:25] INFO -- CNTI: node_pid_by_container_id container_id: containerd://9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365 [2025-07-10 12:05:25] INFO -- CNTI: parse_container_id container_id: containerd://9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365 [2025-07-10 12:05:25] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:25] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:25] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:25] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:26] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:26Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:26Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:26] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8xsck,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-7cfb59478c-8xsck\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.139.240\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-8xsck\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"7a85b8b4-126d-4ce0-9f85-fe1062b541a3\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695\"\n }\n ]\n },\n \"pid\": 2435104,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-7cfb59478c-8xsck\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"7a85b8b4-126d-4ce0-9f85-fe1062b541a3\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-pod7a85b8b4_126d_4ce0_9f85_fe1062b541a3.slice:cri-containerd:9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2434982/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2434982/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2434982/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-7cfb59478c-8xsck\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8xsck,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-controller-manager-7cfb59478c-8xsck\",\n \"NAMESPACE=cnf-testsuite\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6\",\n \"snapshotKey\": \"9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-07-10T12:05:11.804333239Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-8xsck\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"7a85b8b4-126d-4ce0-9f85-fe1062b541a3\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-8xsck_7a85b8b4-126d-4ce0-9f85-fe1062b541a3/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:05:12.035152477Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:26Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:26Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:26] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8xsck,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-controller-manager-7cfb59478c-8xsck" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.139.240:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.139.240" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.139.240:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.139.240" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-8xsck", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "7a85b8b4-126d-4ce0-9f85-fe1062b541a3" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695" } ] }, "pid": 2435104, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-7cfb59478c-8xsck", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "7a85b8b4-126d-4ce0-9f85-fe1062b541a3" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-pod7a85b8b4_126d_4ce0_9f85_fe1062b541a3.slice:cri-containerd:9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2434982/ns/ipc", "type": "ipc" }, { "path": "/proc/2434982/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2434982/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-7cfb59478c-8xsck", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-8xsck,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-controller-manager-7cfb59478c-8xsck", "NAMESPACE=cnf-testsuite", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "665afb3bdea14a7b799e1d65a1bdfb6516618e019bc9d13983faefd5ed461ac6", "snapshotKey": "9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-07-10T12:05:11.804333239Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-8xsck", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "7a85b8b4-126d-4ce0-9f85-fe1062b541a3" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-8xsck_7a85b8b4-126d-4ce0-9f85-fe1062b541a3/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/volumes/kubernetes.io~projected/kube-api-access-f2hnh", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7a85b8b4-126d-4ce0-9f85-fe1062b541a3/containers/manager/ec68f695", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-07-10T12:05:12.035152477Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-07-10 12:05:26] INFO -- CNTI: node_pid_by_container_id pid: 2435104 [2025-07-10 12:05:26] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:26] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:26] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-07-10 12:05:26] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:26] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:26] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2435104\nNgid:\t0\nPid:\t2435104\nPPid:\t2434926\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2435104\t1\nNSpid:\t2435104\t1\nNSpgid:\t2435104\t1\nNSsid:\t2435104\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 82872 kB\nVmRSS:\t 82872 kB\nRssAnon:\t 32508 kB\nRssFile:\t 50364 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t682\nnonvoluntary_ctxt_switches:\t14\n", error: ""} [2025-07-10 12:05:26] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:26] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:24:41Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4610422", "uid" => "bf1d7687-7da9-45d4-b8d3-df4acf658300"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:04:45Z", "lastTransitionTime" => "2025-06-10T13:24:57Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:d4668861cabc1691635d98e827a81cfa834a416f8fe0f4efc609f9f806d86d82", "docker.io/library/docker:dind"], "sizeBytes" => 143701746}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.32.5", "registry.k8s.io/kube-apiserver:v1.32.5"], "sizeBytes" => 98089457}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.32.5", "registry.k8s.io/kube-proxy:v1.32.5"], "sizeBytes" => 95322311}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.32.5", "registry.k8s.io/kube-controller-manager:v1.32.5"], "sizeBytes" => 90814807}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.32.5", "registry.k8s.io/kube-scheduler:v1.32.5"], "sizeBytes" => 70670679}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:2a0b297cc7c4cd376ac7413df339ff2fdaa1ec9d099aed92b5ea1f031ef7f639", "registry.k8s.io/sig-storage/csi-resizer:v1.13.1"], "sizeBytes" => 32400950}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:a399393ff5bd156277c56bae0c08389b1a1b95b7fd6ea44a316ce55e0dd559d7", "registry.k8s.io/sig-storage/csi-attacher:v4.8.0"], "sizeBytes" => 32231444}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:b64f9c8ec79c5dae244ae6608c433bf16c9d4f84248dcba4a6beb2e97b9426d7", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.1"], "sizeBytes" => 17992142}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:d7138bcc3aa5f267403d45ad4292c95397e421ea17a0035888850f424c7de25d", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0"], "sizeBytes" => 14781503}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:84bf6f3e75df53f0e7baf30b85ac6e4a5ad456aa7cf776609134b5917eb4837d", "registry.k8s.io/build-image/distroless-iptables:v0.6.9"], "sizeBytes" => 11529845}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.5", "kubeletVersion" => "v1.32.5", "machineID" => "1112950780464cd4bcf71119fed9194f", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "40b96367-b15c-4fa9-9122-aee3f2a56484"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-07-10T12:05:11Z", "generateName" => "gatekeeper-controller-manager-7cfb59478c-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "7cfb59478c", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-7cfb59478c-8xsck", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-7cfb59478c", "uid" => "185111cb-7686-4460-be0e-7687301e769e"}], "resourceVersion" => "4610618", "uid" => "7a85b8b4-126d-4ce0-9f85-fe1062b541a3"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-f2hnh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-f2hnh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-f2hnh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.5", "podIPs" => [{"ip" => "10.244.1.5"}], "qosClass" => "Burstable", "startTime" => "2025-07-10T12:05:11Z"}}, container_status: {"containerID" => "containerd://9173eb9757c80653e881fb00d13a9d8d804b6e5d9c92c3d2172aead212f03365", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-f2hnh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2435104\nNgid:\t0\nPid:\t2435104\nPPid:\t2434926\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2435104\t1\nNSpid:\t2435104\t1\nNSpgid:\t2435104\t1\nNSsid:\t2435104\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 82872 kB\nVmRSS:\t 82872 kB\nRssAnon:\t 32508 kB\nRssFile:\t 50364 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t682\nnonvoluntary_ctxt_switches:\t14\n", pid: "2435104", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-07-10 12:05:26] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:25:00Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-dftv5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:26] INFO -- CNTI: node_pid_by_container_id container_id: containerd://6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5 [2025-07-10 12:05:26] INFO -- CNTI: parse_container_id container_id: containerd://6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5 [2025-07-10 12:05:26] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:26] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:26] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:27] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:27Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:27Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:27] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440\",\n \"user_specified_image\": \"alpine:3.6\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-nvrsb\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"4bf361e6-1e6d-4550-9837-760d66a7d259\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"loopdev/0.log\",\n \"metadata\": {\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/dev\",\n \"host_path\": \"/dev\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27\"\n }\n ]\n },\n \"pid\": 863,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"loopdev\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"alpine:3.6\",\n \"io.kubernetes.cri.sandbox-id\": \"7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78\",\n \"io.kubernetes.cri.sandbox-name\": \"create-loop-devs-nvrsb\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"4bf361e6-1e6d-4550-9837-760d66a7d259\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod4bf361e6_1e6d_4550_9837_760d66a7d259.slice:cri-containerd:6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/829/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/829/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/829/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/dev\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=create-loop-devs-nvrsb\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0,\n 1,\n 2,\n 3,\n 4,\n 6,\n 10,\n 11,\n 20,\n 26,\n 27\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78\",\n \"snapshotKey\": \"6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:25:00.537625688Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/library/alpine:3.6\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-nvrsb\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"4bf361e6-1e6d-4550-9837-760d66a7d259\"\n },\n \"logPath\": \"/var/log/pods/kube-system_create-loop-devs-nvrsb_4bf361e6-1e6d-4550-9837-760d66a7d259/loopdev/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/dev\",\n \"gidMappings\": [],\n \"hostPath\": \"/dev\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:25:00.679209004Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\",\n \"1\",\n \"2\",\n \"3\",\n \"4\",\n \"6\",\n \"10\",\n \"11\",\n \"20\",\n \"26\",\n \"27\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:27Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:27Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:27] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "envs": [ { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" } ], "image": { "image": "sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440", "user_specified_image": "alpine:3.6" }, "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-nvrsb", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "4bf361e6-1e6d-4550-9837-760d66a7d259" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "loopdev/0.log", "metadata": { "name": "loopdev" }, "mounts": [ { "container_path": "/dev", "host_path": "/dev" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27" } ] }, "pid": 863, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "loopdev", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "alpine:3.6", "io.kubernetes.cri.sandbox-id": "7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78", "io.kubernetes.cri.sandbox-name": "create-loop-devs-nvrsb", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "4bf361e6-1e6d-4550-9837-760d66a7d259" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod4bf361e6_1e6d_4550_9837_760d66a7d259.slice:cri-containerd:6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/829/ns/ipc", "type": "ipc" }, { "path": "/proc/829/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/829/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/dev", "options": [ "rbind", "rprivate", "rw" ], "source": "/dev", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=create-loop-devs-nvrsb", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBERNETES_SERVICE_PORT=443", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PORT=9153" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0, 1, 2, 3, 4, 6, 10, 11, 20, 26, 27 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "7ed1b53bbf82a19afa7e652e1d804ac513114c688ff2bb4991be5924e4054c78", "snapshotKey": "6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:25:00.537625688Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "6bbb0b24d389a37a47026f12d4d8db54c1ed79563e8c62bf8b15995b95f299f5", "image": { "annotations": {}, "image": "docker.io/library/alpine:3.6", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-nvrsb", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "4bf361e6-1e6d-4550-9837-760d66a7d259" }, "logPath": "/var/log/pods/kube-system_create-loop-devs-nvrsb_4bf361e6-1e6d-4550-9837-760d66a7d259/loopdev/0.log", "message": "", "metadata": { "attempt": 0, "name": "loopdev" }, "mounts": [ { "containerPath": "/dev", "gidMappings": [], "hostPath": "/dev", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/volumes/kubernetes.io~projected/kube-api-access-dftv5", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/4bf361e6-1e6d-4550-9837-760d66a7d259/containers/loopdev/b6d86e27", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-10T13:25:00.679209004Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0", "1", "2", "3", "4", "6", "10", "11", "20", "26", "27" ], "uid": "0" } } } } [2025-07-10 12:05:27] INFO -- CNTI: node_pid_by_container_id pid: 863 [2025-07-10 12:05:27] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:27] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:27] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:27] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:27] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:27] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sh\u0000-c\u0000while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n\u0000", error: ""} [2025-07-10 12:05:27] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:27] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:27] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:27] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:27] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:28] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t863\nNgid:\t0\nPid:\t863\nPPid:\t804\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t863\t1\nNSpid:\t863\t1\nNSpgid:\t863\t1\nNSsid:\t863\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 1036 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t922\nnonvoluntary_ctxt_switches:\t6\n", error: ""} [2025-07-10 12:05:28] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:28] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e", "image" => "docker.io/kindest/kindnetd:v20250512-df8de77b", "imageID" => "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:46Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/nri", "name" => "nri-plugin"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fqbgm", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:28] INFO -- CNTI: node_pid_by_container_id container_id: containerd://77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e [2025-07-10 12:05:28] INFO -- CNTI: parse_container_id container_id: containerd://77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e [2025-07-10 12:05:28] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:28] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:28] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:28] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:28] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:28Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:28Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:28] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"envs\": [\n {\n \"key\": \"HOST_IP\",\n \"value\": \"172.24.0.8\"\n },\n {\n \"key\": \"POD_IP\",\n \"value\": \"172.24.0.8\"\n },\n {\n \"key\": \"POD_SUBNET\",\n \"value\": \"10.244.0.0/16\"\n },\n {\n \"key\": \"CONTROL_PLANE_ENDPOINT\",\n \"value\": \"v132-control-plane:6443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"user_specified_image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-xkjck\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"fe401fcf-e036-4a80-85ce-657da7092395\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 52428800,\n \"memory_swap_limit_in_bytes\": 52428800,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"capabilities\": {\n \"add_capabilities\": [\n \"NET_RAW\",\n \"NET_ADMIN\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kindnet-cni/0.log\",\n \"metadata\": {\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/cni/net.d\",\n \"host_path\": \"/etc/cni/net.d\"\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/nri\",\n \"host_path\": \"/var/run/nri\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c\"\n }\n ]\n },\n \"pid\": 696,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kindnet-cni\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"io.kubernetes.cri.sandbox-id\": \"f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1\",\n \"io.kubernetes.cri.sandbox-name\": \"kindnet-xkjck\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"fe401fcf-e036-4a80-85ce-657da7092395\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-podfe401fcf_e036_4a80_85ce_657da7092395.slice:cri-containerd:77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/454/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/454/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/454/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 52428800,\n \"swap\": 52428800\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/cni/net.d\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/etc/cni/net.d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/nri\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/run/nri\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/kindnetd\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker\",\n \"HOST_IP=172.24.0.8\",\n \"POD_IP=172.24.0.8\",\n \"POD_SUBNET=10.244.0.0/16\",\n \"CONTROL_PLANE_ENDPOINT=v132-control-plane:6443\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1\",\n \"snapshotKey\": \"77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:45.240417005Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-xkjck\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"fe401fcf-e036-4a80-85ce-657da7092395\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kindnet-xkjck_fe401fcf-e036-4a80-85ce-657da7092395/kindnet-cni/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/cni/net.d\",\n \"gidMappings\": [],\n \"hostPath\": \"/etc/cni/net.d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/nri\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/run/nri\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"52428800\",\n \"memorySwapLimitInBytes\": \"52428800\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:46.790985205Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:28Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:28Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:28] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "envs": [ { "key": "HOST_IP", "value": "172.24.0.8" }, { "key": "POD_IP", "value": "172.24.0.8" }, { "key": "POD_SUBNET", "value": "10.244.0.0/16" }, { "key": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" } ], "image": { "image": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "user_specified_image": "docker.io/kindest/kindnetd:v20250512-df8de77b" }, "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-xkjck", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "fe401fcf-e036-4a80-85ce-657da7092395" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 52428800, "memory_swap_limit_in_bytes": 52428800, "oom_score_adj": -997 }, "security_context": { "capabilities": { "add_capabilities": [ "NET_RAW", "NET_ADMIN" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kindnet-cni/0.log", "metadata": { "name": "kindnet-cni" }, "mounts": [ { "container_path": "/etc/cni/net.d", "host_path": "/etc/cni/net.d" }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/nri", "host_path": "/var/run/nri" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c" } ] }, "pid": 696, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kindnet-cni", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/kindest/kindnetd:v20250512-df8de77b", "io.kubernetes.cri.sandbox-id": "f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1", "io.kubernetes.cri.sandbox-name": "kindnet-xkjck", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "fe401fcf-e036-4a80-85ce-657da7092395" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-podfe401fcf_e036_4a80_85ce_657da7092395.slice:cri-containerd:77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/454/ns/ipc", "type": "ipc" }, { "path": "/proc/454/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/454/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 52428800, "swap": 52428800 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1/shm", "type": "bind" }, { "destination": "/etc/cni/net.d", "options": [ "rbind", "rprivate", "rw" ], "source": "/etc/cni/net.d", "type": "bind" }, { "destination": "/var/run/nri", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/run/nri", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/kindnetd" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker", "HOST_IP=172.24.0.8", "POD_IP=172.24.0.8", "POD_SUBNET=10.244.0.0/16", "CONTROL_PLANE_ENDPOINT=v132-control-plane:6443", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "f8d1c044448a2a0182747c6b4db368509aeda12ebc0f468ddf44bb41390018b1", "snapshotKey": "77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:45.240417005Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "77cd21be2dbed715efe2e2a3f4b1f75c19a70db5e1a3a5dd1556d8c8a8257f5e", "image": { "annotations": {}, "image": "docker.io/kindest/kindnetd:v20250512-df8de77b", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-xkjck", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "fe401fcf-e036-4a80-85ce-657da7092395" }, "logPath": "/var/log/pods/kube-system_kindnet-xkjck_fe401fcf-e036-4a80-85ce-657da7092395/kindnet-cni/0.log", "message": "", "metadata": { "attempt": 0, "name": "kindnet-cni" }, "mounts": [ { "containerPath": "/etc/cni/net.d", "gidMappings": [], "hostPath": "/etc/cni/net.d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/nri", "gidMappings": [], "hostPath": "/var/run/nri", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/volumes/kubernetes.io~projected/kube-api-access-fqbgm", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/fe401fcf-e036-4a80-85ce-657da7092395/containers/kindnet-cni/2ac1338c", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "52428800", "memorySwapLimitInBytes": "52428800", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:46.790985205Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:28] INFO -- CNTI: node_pid_by_container_id pid: 696 [2025-07-10 12:05:28] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:28] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:28] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:28] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:28] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/bin/kindnetd\u0000", error: ""} [2025-07-10 12:05:28] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:28] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:29] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:29] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t696\nNgid:\t569898\nPid:\t696\nPPid:\t401\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t696\t1\nNSpid:\t696\t1\nNSpgid:\t696\t1\nNSsid:\t696\t1\nVmPeak:\t 1285448 kB\nVmSize:\t 1285448 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 46832 kB\nVmRSS:\t 27356 kB\nRssAnon:\t 15832 kB\nRssFile:\t 11524 kB\nRssShmem:\t 0 kB\nVmData:\t 72080 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 264 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t42\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t264146\nnonvoluntary_ctxt_switches:\t8708\n", error: ""} [2025-07-10 12:05:29] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:29] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.5", "imageID" => "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:44Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-crv5k", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:29] INFO -- CNTI: node_pid_by_container_id container_id: containerd://19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582 [2025-07-10 12:05:29] INFO -- CNTI: parse_container_id container_id: containerd://19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582 [2025-07-10 12:05:29] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:29] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:29] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:29] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:29] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:29Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:29Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:29] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"d694c602\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v132-worker\"\n ],\n \"envs\": [\n {\n \"key\": \"NODE_NAME\",\n \"value\": \"v132-worker\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\",\n \"user_specified_image\": \"registry.k8s.io/kube-proxy:v1.32.5\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-r5tsk\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"c6a13750-7bb0-4aa1-8766-81efe70beccb\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kube-proxy/0.log\",\n \"metadata\": {\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/lib/kube-proxy\",\n \"host_path\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251\"\n }\n ]\n },\n \"pid\": 507,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kube-proxy\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"registry.k8s.io/kube-proxy:v1.32.5\",\n \"io.kubernetes.cri.sandbox-id\": \"32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7\",\n \"io.kubernetes.cri.sandbox-name\": \"kube-proxy-r5tsk\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"c6a13750-7bb0-4aa1-8766-81efe70beccb\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-podc6a13750_7bb0_4aa1_8766_81efe70beccb.slice:cri-containerd:19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/447/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/447/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/447/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/lib/kube-proxy\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v132-worker\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker\",\n \"NODE_NAME=v132-worker\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7\",\n \"snapshotKey\": \"19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"d694c602\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:44.019887447Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"registry.k8s.io/kube-proxy-amd64:v1.32.5\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-r5tsk\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"c6a13750-7bb0-4aa1-8766-81efe70beccb\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kube-proxy-r5tsk_c6a13750-7bb0-4aa1-8766-81efe70beccb/kube-proxy/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/lib/kube-proxy\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:44.439920418Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:29Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:29Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:29] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "d694c602", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v132-worker" ], "envs": [ { "key": "NODE_NAME", "value": "v132-worker" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" } ], "image": { "image": "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "user_specified_image": "registry.k8s.io/kube-proxy:v1.32.5" }, "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-r5tsk", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "c6a13750-7bb0-4aa1-8766-81efe70beccb" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kube-proxy/0.log", "metadata": { "name": "kube-proxy" }, "mounts": [ { "container_path": "/var/lib/kube-proxy", "host_path": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy", "readonly": true }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251" } ] }, "pid": 507, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kube-proxy", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "registry.k8s.io/kube-proxy:v1.32.5", "io.kubernetes.cri.sandbox-id": "32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7", "io.kubernetes.cri.sandbox-name": "kube-proxy-r5tsk", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "c6a13750-7bb0-4aa1-8766-81efe70beccb" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-podc6a13750_7bb0_4aa1_8766_81efe70beccb.slice:cri-containerd:19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/447/ns/ipc", "type": "ipc" }, { "path": "/proc/447/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/447/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7/shm", "type": "bind" }, { "destination": "/var/lib/kube-proxy", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v132-worker" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker", "NODE_NAME=v132-worker", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBE_DNS_PORT_9153_TCP_PORT=9153" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "32eea3dbb15043156d8add040cad2b21c0533e61974e277252754873b9d7c5e7", "snapshotKey": "19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "d694c602", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:44.019887447Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "19381f8efcbae7b37538bccc5345b342100821365b71b2d057c755749e39b582", "image": { "annotations": {}, "image": "registry.k8s.io/kube-proxy-amd64:v1.32.5", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-r5tsk", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "c6a13750-7bb0-4aa1-8766-81efe70beccb" }, "logPath": "/var/log/pods/kube-system_kube-proxy-r5tsk_c6a13750-7bb0-4aa1-8766-81efe70beccb/kube-proxy/0.log", "message": "", "metadata": { "attempt": 0, "name": "kube-proxy" }, "mounts": [ { "containerPath": "/var/lib/kube-proxy", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~configmap/kube-proxy", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/volumes/kubernetes.io~projected/kube-api-access-crv5k", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/c6a13750-7bb0-4aa1-8766-81efe70beccb/containers/kube-proxy/7e257251", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:44.439920418Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:29] INFO -- CNTI: node_pid_by_container_id pid: 507 [2025-07-10 12:05:29] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:29] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:29] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:29] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:29] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:30] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/usr/local/bin/kube-proxy\u0000--config=/var/lib/kube-proxy/config.conf\u0000--hostname-override=v132-worker\u0000", error: ""} [2025-07-10 12:05:30] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:30] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-htvs5 [2025-07-10 12:05:30] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:30] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:30] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t507\nNgid:\t568892\nPid:\t507\nPPid:\t399\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t507\t1\nNSpid:\t507\t1\nNSpgid:\t507\t1\nNSsid:\t507\t1\nVmPeak:\t 1300092 kB\nVmSize:\t 1300092 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 59292 kB\nVmRSS:\t 35736 kB\nRssAnon:\t 21188 kB\nRssFile:\t 14548 kB\nRssShmem:\t 0 kB\nVmData:\t 95744 kB\nVmStk:\t 132 kB\nVmExe:\t 30360 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t39\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t156543\nnonvoluntary_ctxt_switches:\t444\n", error: ""} [2025-07-10 12:05:30] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:30] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 8 pods: coredns-coredns-56898dd654-2js9x, cluster-tools-2gwh4, gatekeeper-audit-7ccf77cb5b-6vxxn, gatekeeper-controller-manager-7cfb59478c-6kqfs, create-loop-devs-dsrxz, kindnet-brb7q, kube-proxy-qwd9g, chaos-operator-ce-7d9fdb77d5-79ccw [2025-07-10 12:05:30] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:02:20Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:30] INFO -- CNTI: node_pid_by_container_id container_id: containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:05:30] INFO -- CNTI: parse_container_id container_id: containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:05:30] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:30] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:30] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:30] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:31] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:31Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:31Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:31] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\"\n }\n ]\n },\n \"pid\": 2603188,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603161/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603161/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603161/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-56898dd654-2js9x\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"snapshotKey\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:02:19.316789727Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:02:20.898798426Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:31Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:31Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:31] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.78.210" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639" } ] }, "pid": 2603188, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "io.kubernetes.cri.sandbox-name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "e7a23045-b167-4251-b263-10084835e501" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603161/ns/ipc", "type": "ipc" }, { "path": "/proc/2603161/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603161/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-56898dd654-2js9x", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP_PORT=53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "snapshotKey": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:02:19.316789727Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-07-10T12:02:20.898798426Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:31] INFO -- CNTI: node_pid_by_container_id pid: 2603188 [2025-07-10 12:05:31] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:31] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:31] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:31] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:31] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:31] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:31] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:05:31] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:31] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:31] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:31] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:31] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:31] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:32] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748568 kB\nVmSize:\t 748568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41576 kB\nVmRSS:\t 41576 kB\nRssAnon:\t 12536 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t18\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1007\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-07-10 12:05:32] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:32] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4", "image" => "docker.io/lfncnti/cluster-tools:v1.0.8", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:00:07Z"}}, "volumeMounts" => [{"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/host", "name" => "hostfs"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-xdb97", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:32] INFO -- CNTI: node_pid_by_container_id container_id: containerd://2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4 [2025-07-10 12:05:32] INFO -- CNTI: parse_container_id container_id: containerd://2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4 [2025-07-10 12:05:32] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:32] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:32] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:32] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:32] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:32] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:32Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:32Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:32] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f\",\n \"user_specified_image\": \"lfncnti/cluster-tools:v1.0.8\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-2gwh4\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"55aab1ee-161d-4716-bd96-2d596290bbb8\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 2\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"cluster-tools/0.log\",\n \"metadata\": {\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/run/systemd/\",\n \"host_path\": \"/run/systemd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/proc\",\n \"host_path\": \"/proc\"\n },\n {\n \"container_path\": \"/host\",\n \"host_path\": \"/\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02\"\n }\n ]\n },\n \"pid\": 2601770,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"cluster-tools\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"lfncnti/cluster-tools:v1.0.8\",\n \"io.kubernetes.cri.sandbox-id\": \"7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f\",\n \"io.kubernetes.cri.sandbox-name\": \"cluster-tools-2gwh4\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"55aab1ee-161d-4716-bd96-2d596290bbb8\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod55aab1ee_161d_4716_bd96_2d596290bbb8.slice:cri-containerd:2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 1000,\n \"path\": \"/dev/loop1000\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/loop128\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/loop129\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/loop130\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/loop131\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/loop132\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/loop133\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/loop134\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 135,\n \"path\": \"/dev/loop135\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 136,\n \"path\": \"/dev/loop136\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 137,\n \"path\": \"/dev/loop137\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 138,\n \"path\": \"/dev/loop138\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 139,\n \"path\": \"/dev/loop139\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 140,\n \"path\": \"/dev/loop140\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 141,\n \"path\": \"/dev/loop141\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 142,\n \"path\": \"/dev/loop142\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 143,\n \"path\": \"/dev/loop143\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 144,\n \"path\": \"/dev/loop144\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 145,\n \"path\": \"/dev/loop145\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 146,\n \"path\": \"/dev/loop146\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 147,\n \"path\": \"/dev/loop147\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 148,\n \"path\": \"/dev/loop148\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 149,\n \"path\": \"/dev/loop149\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 150,\n \"path\": \"/dev/loop150\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 151,\n \"path\": \"/dev/loop151\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 152,\n \"path\": \"/dev/loop152\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 153,\n \"path\": \"/dev/loop153\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 154,\n \"path\": \"/dev/loop154\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 155,\n \"path\": \"/dev/loop155\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 156,\n \"path\": \"/dev/loop156\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 157,\n \"path\": \"/dev/loop157\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 158,\n \"path\": \"/dev/loop158\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 159,\n \"path\": \"/dev/loop159\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 160,\n \"path\": \"/dev/loop160\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 161,\n \"path\": \"/dev/loop161\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 162,\n \"path\": \"/dev/loop162\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 163,\n \"path\": \"/dev/loop163\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 164,\n \"path\": \"/dev/loop164\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 165,\n \"path\": \"/dev/loop165\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 166,\n \"path\": \"/dev/loop166\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 167,\n \"path\": \"/dev/loop167\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 168,\n \"path\": \"/dev/loop168\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 169,\n \"path\": \"/dev/loop169\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 170,\n \"path\": \"/dev/loop170\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 171,\n \"path\": \"/dev/loop171\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 172,\n \"path\": \"/dev/loop172\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 173,\n \"path\": \"/dev/loop173\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 174,\n \"path\": \"/dev/loop174\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 175,\n \"path\": \"/dev/loop175\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 176,\n \"path\": \"/dev/loop176\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 177,\n \"path\": \"/dev/loop177\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 178,\n \"path\": \"/dev/loop178\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 179,\n \"path\": \"/dev/loop179\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 180,\n \"path\": \"/dev/loop180\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 181,\n \"path\": \"/dev/loop181\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 182,\n \"path\": \"/dev/loop182\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 183,\n \"path\": \"/dev/loop183\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 184,\n \"path\": \"/dev/loop184\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 185,\n \"path\": \"/dev/loop185\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 186,\n \"path\": \"/dev/loop186\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 187,\n \"path\": \"/dev/loop187\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 188,\n \"path\": \"/dev/loop188\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 189,\n \"path\": \"/dev/loop189\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 190,\n \"path\": \"/dev/loop190\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 191,\n \"path\": \"/dev/loop191\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 192,\n \"path\": \"/dev/loop192\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 193,\n \"path\": \"/dev/loop193\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 194,\n \"path\": \"/dev/loop194\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 195,\n \"path\": \"/dev/loop195\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 196,\n \"path\": \"/dev/loop196\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 197,\n \"path\": \"/dev/loop197\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 198,\n \"path\": \"/dev/loop198\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 199,\n \"path\": \"/dev/loop199\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 200,\n \"path\": \"/dev/loop200\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 201,\n \"path\": \"/dev/loop201\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 202,\n \"path\": \"/dev/loop202\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 203,\n \"path\": \"/dev/loop203\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 204,\n \"path\": \"/dev/loop204\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 205,\n \"path\": \"/dev/loop205\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 206,\n \"path\": \"/dev/loop206\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 207,\n \"path\": \"/dev/loop207\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 208,\n \"path\": \"/dev/loop208\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 209,\n \"path\": \"/dev/loop209\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 210,\n \"path\": \"/dev/loop210\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 211,\n \"path\": \"/dev/loop211\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 212,\n \"path\": \"/dev/loop212\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 213,\n \"path\": \"/dev/loop213\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 214,\n \"path\": \"/dev/loop214\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 215,\n \"path\": \"/dev/loop215\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 216,\n \"path\": \"/dev/loop216\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 217,\n \"path\": \"/dev/loop217\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 218,\n \"path\": \"/dev/loop218\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 219,\n \"path\": \"/dev/loop219\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 220,\n \"path\": \"/dev/loop220\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 221,\n \"path\": \"/dev/loop221\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 222,\n \"path\": \"/dev/loop222\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 223,\n \"path\": \"/dev/loop223\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 224,\n \"path\": \"/dev/loop224\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 225,\n \"path\": \"/dev/loop225\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 226,\n \"path\": \"/dev/loop226\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 227,\n \"path\": \"/dev/loop227\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 228,\n \"path\": \"/dev/loop228\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 229,\n \"path\": \"/dev/loop229\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 230,\n \"path\": \"/dev/loop230\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 231,\n \"path\": \"/dev/loop231\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 232,\n \"path\": \"/dev/loop232\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 233,\n \"path\": \"/dev/loop233\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 234,\n \"path\": \"/dev/loop234\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 235,\n \"path\": \"/dev/loop235\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 236,\n \"path\": \"/dev/loop236\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 237,\n \"path\": \"/dev/loop237\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 238,\n \"path\": \"/dev/loop238\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 239,\n \"path\": \"/dev/loop239\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 240,\n \"path\": \"/dev/loop240\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 241,\n \"path\": \"/dev/loop241\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 242,\n \"path\": \"/dev/loop242\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 243,\n \"path\": \"/dev/loop243\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 244,\n \"path\": \"/dev/loop244\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 245,\n \"path\": \"/dev/loop245\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 246,\n \"path\": \"/dev/loop246\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 247,\n \"path\": \"/dev/loop247\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 248,\n \"path\": \"/dev/loop248\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 249,\n \"path\": \"/dev/loop249\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 250,\n \"path\": \"/dev/loop250\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 251,\n \"path\": \"/dev/loop251\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 252,\n \"path\": \"/dev/loop252\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 253,\n \"path\": \"/dev/loop253\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 254,\n \"path\": \"/dev/loop254\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 255,\n \"path\": \"/dev/loop255\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 256,\n \"path\": \"/dev/loop256\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 257,\n \"path\": \"/dev/loop257\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 258,\n \"path\": \"/dev/loop258\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 259,\n \"path\": \"/dev/loop259\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 260,\n \"path\": \"/dev/loop260\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 261,\n \"path\": \"/dev/loop261\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 262,\n \"path\": \"/dev/loop262\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 263,\n \"path\": \"/dev/loop263\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 264,\n \"path\": \"/dev/loop264\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 265,\n \"path\": \"/dev/loop265\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 266,\n \"path\": \"/dev/loop266\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 267,\n \"path\": \"/dev/loop267\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 268,\n \"path\": \"/dev/loop268\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 269,\n \"path\": \"/dev/loop269\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 270,\n \"path\": \"/dev/loop270\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 271,\n \"path\": \"/dev/loop271\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 272,\n \"path\": \"/dev/loop272\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 273,\n \"path\": \"/dev/loop273\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 274,\n \"path\": \"/dev/loop274\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 275,\n \"path\": \"/dev/loop275\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 276,\n \"path\": \"/dev/loop276\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 277,\n \"path\": \"/dev/loop277\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 278,\n \"path\": \"/dev/loop278\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 279,\n \"path\": \"/dev/loop279\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 280,\n \"path\": \"/dev/loop280\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 281,\n \"path\": \"/dev/loop281\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 282,\n \"path\": \"/dev/loop282\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 283,\n \"path\": \"/dev/loop283\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 284,\n \"path\": \"/dev/loop284\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 285,\n \"path\": \"/dev/loop285\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 286,\n \"path\": \"/dev/loop286\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 287,\n \"path\": \"/dev/loop287\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 288,\n \"path\": \"/dev/loop288\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 289,\n \"path\": \"/dev/loop289\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 290,\n \"path\": \"/dev/loop290\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 291,\n \"path\": \"/dev/loop291\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 292,\n \"path\": \"/dev/loop292\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 293,\n \"path\": \"/dev/loop293\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 294,\n \"path\": \"/dev/loop294\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 295,\n \"path\": \"/dev/loop295\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 296,\n \"path\": \"/dev/loop296\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 297,\n \"path\": \"/dev/loop297\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 298,\n \"path\": \"/dev/loop298\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 299,\n \"path\": \"/dev/loop299\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 300,\n \"path\": \"/dev/loop300\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 301,\n \"path\": \"/dev/loop301\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 302,\n \"path\": \"/dev/loop302\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 303,\n \"path\": \"/dev/loop303\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 304,\n \"path\": \"/dev/loop304\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 305,\n \"path\": \"/dev/loop305\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 306,\n \"path\": \"/dev/loop306\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 307,\n \"path\": \"/dev/loop307\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 308,\n \"path\": \"/dev/loop308\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 309,\n \"path\": \"/dev/loop309\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 310,\n \"path\": \"/dev/loop310\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 311,\n \"path\": \"/dev/loop311\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 312,\n \"path\": \"/dev/loop312\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 313,\n \"path\": \"/dev/loop313\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 314,\n \"path\": \"/dev/loop314\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 315,\n \"path\": \"/dev/loop315\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 316,\n \"path\": \"/dev/loop316\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 317,\n \"path\": \"/dev/loop317\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 318,\n \"path\": \"/dev/loop318\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 319,\n \"path\": \"/dev/loop319\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 320,\n \"path\": \"/dev/loop320\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 321,\n \"path\": \"/dev/loop321\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 322,\n \"path\": \"/dev/loop322\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 323,\n \"path\": \"/dev/loop323\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 324,\n \"path\": \"/dev/loop324\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 325,\n \"path\": \"/dev/loop325\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 326,\n \"path\": \"/dev/loop326\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 327,\n \"path\": \"/dev/loop327\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 328,\n \"path\": \"/dev/loop328\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 329,\n \"path\": \"/dev/loop329\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 330,\n \"path\": \"/dev/loop330\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 331,\n \"path\": \"/dev/loop331\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 332,\n \"path\": \"/dev/loop332\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 333,\n \"path\": \"/dev/loop333\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 334,\n \"path\": \"/dev/loop334\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 335,\n \"path\": \"/dev/loop335\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 336,\n \"path\": \"/dev/loop336\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 337,\n \"path\": \"/dev/loop337\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 338,\n \"path\": \"/dev/loop338\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 339,\n \"path\": \"/dev/loop339\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 340,\n \"path\": \"/dev/loop340\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 341,\n \"path\": \"/dev/loop341\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 342,\n \"path\": \"/dev/loop342\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 343,\n \"path\": \"/dev/loop343\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 344,\n \"path\": \"/dev/loop344\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 345,\n \"path\": \"/dev/loop345\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 346,\n \"path\": \"/dev/loop346\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 347,\n \"path\": \"/dev/loop347\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 348,\n \"path\": \"/dev/loop348\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 349,\n \"path\": \"/dev/loop349\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 350,\n \"path\": \"/dev/loop350\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 351,\n \"path\": \"/dev/loop351\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 352,\n \"path\": \"/dev/loop352\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 353,\n \"path\": \"/dev/loop353\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 354,\n \"path\": \"/dev/loop354\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 355,\n \"path\": \"/dev/loop355\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 356,\n \"path\": \"/dev/loop356\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 357,\n \"path\": \"/dev/loop357\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 358,\n \"path\": \"/dev/loop358\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 359,\n \"path\": \"/dev/loop359\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 360,\n \"path\": \"/dev/loop360\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 361,\n \"path\": \"/dev/loop361\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 362,\n \"path\": \"/dev/loop362\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 363,\n \"path\": \"/dev/loop363\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 364,\n \"path\": \"/dev/loop364\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 365,\n \"path\": \"/dev/loop365\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 366,\n \"path\": \"/dev/loop366\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 367,\n \"path\": \"/dev/loop367\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 368,\n \"path\": \"/dev/loop368\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 369,\n \"path\": \"/dev/loop369\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 370,\n \"path\": \"/dev/loop370\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 371,\n \"path\": \"/dev/loop371\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 372,\n \"path\": \"/dev/loop372\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 373,\n \"path\": \"/dev/loop373\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 374,\n \"path\": \"/dev/loop374\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 375,\n \"path\": \"/dev/loop375\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 376,\n \"path\": \"/dev/loop376\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 377,\n \"path\": \"/dev/loop377\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 378,\n \"path\": \"/dev/loop378\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 379,\n \"path\": \"/dev/loop379\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 380,\n \"path\": \"/dev/loop380\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 381,\n \"path\": \"/dev/loop381\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 382,\n \"path\": \"/dev/loop382\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 383,\n \"path\": \"/dev/loop383\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 384,\n \"path\": \"/dev/loop384\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 385,\n \"path\": \"/dev/loop385\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 386,\n \"path\": \"/dev/loop386\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 387,\n \"path\": \"/dev/loop387\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 388,\n \"path\": \"/dev/loop388\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 389,\n \"path\": \"/dev/loop389\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 390,\n \"path\": \"/dev/loop390\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 391,\n \"path\": \"/dev/loop391\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 392,\n \"path\": \"/dev/loop392\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 393,\n \"path\": \"/dev/loop393\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 394,\n \"path\": \"/dev/loop394\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 395,\n \"path\": \"/dev/loop395\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 396,\n \"path\": \"/dev/loop396\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 397,\n \"path\": \"/dev/loop397\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 398,\n \"path\": \"/dev/loop398\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 399,\n \"path\": \"/dev/loop399\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 400,\n \"path\": \"/dev/loop400\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 401,\n \"path\": \"/dev/loop401\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 402,\n \"path\": \"/dev/loop402\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 403,\n \"path\": \"/dev/loop403\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 404,\n \"path\": \"/dev/loop404\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 405,\n \"path\": \"/dev/loop405\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 406,\n \"path\": \"/dev/loop406\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 407,\n \"path\": \"/dev/loop407\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 408,\n \"path\": \"/dev/loop408\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 409,\n \"path\": \"/dev/loop409\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 410,\n \"path\": \"/dev/loop410\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 411,\n \"path\": \"/dev/loop411\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 412,\n \"path\": \"/dev/loop412\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 413,\n \"path\": \"/dev/loop413\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 414,\n \"path\": \"/dev/loop414\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 415,\n \"path\": \"/dev/loop415\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 416,\n \"path\": \"/dev/loop416\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 417,\n \"path\": \"/dev/loop417\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 418,\n \"path\": \"/dev/loop418\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 419,\n \"path\": \"/dev/loop419\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 420,\n \"path\": \"/dev/loop420\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 421,\n \"path\": \"/dev/loop421\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 422,\n \"path\": \"/dev/loop422\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 423,\n \"path\": \"/dev/loop423\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 424,\n \"path\": \"/dev/loop424\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 425,\n \"path\": \"/dev/loop425\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 426,\n \"path\": \"/dev/loop426\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 427,\n \"path\": \"/dev/loop427\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 428,\n \"path\": \"/dev/loop428\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 429,\n \"path\": \"/dev/loop429\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 430,\n \"path\": \"/dev/loop430\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 431,\n \"path\": \"/dev/loop431\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 432,\n \"path\": \"/dev/loop432\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 433,\n \"path\": \"/dev/loop433\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 434,\n \"path\": \"/dev/loop434\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 435,\n \"path\": \"/dev/loop435\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 436,\n \"path\": \"/dev/loop436\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 437,\n \"path\": \"/dev/loop437\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 438,\n \"path\": \"/dev/loop438\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 439,\n \"path\": \"/dev/loop439\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 440,\n \"path\": \"/dev/loop440\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 441,\n \"path\": \"/dev/loop441\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 442,\n \"path\": \"/dev/loop442\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 443,\n \"path\": \"/dev/loop443\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 444,\n \"path\": \"/dev/loop444\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 445,\n \"path\": \"/dev/loop445\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 446,\n \"path\": \"/dev/loop446\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 447,\n \"path\": \"/dev/loop447\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 448,\n \"path\": \"/dev/loop448\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 449,\n \"path\": \"/dev/loop449\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 450,\n \"path\": \"/dev/loop450\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 451,\n \"path\": \"/dev/loop451\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 452,\n \"path\": \"/dev/loop452\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 453,\n \"path\": \"/dev/loop453\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 454,\n \"path\": \"/dev/loop454\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 455,\n \"path\": \"/dev/loop455\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 456,\n \"path\": \"/dev/loop456\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 457,\n \"path\": \"/dev/loop457\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 458,\n \"path\": \"/dev/loop458\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 459,\n \"path\": \"/dev/loop459\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 460,\n \"path\": \"/dev/loop460\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 461,\n \"path\": \"/dev/loop461\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 462,\n \"path\": \"/dev/loop462\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 463,\n \"path\": \"/dev/loop463\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 464,\n \"path\": \"/dev/loop464\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 465,\n \"path\": \"/dev/loop465\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 466,\n \"path\": \"/dev/loop466\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 467,\n \"path\": \"/dev/loop467\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 468,\n \"path\": \"/dev/loop468\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 469,\n \"path\": \"/dev/loop469\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 470,\n \"path\": \"/dev/loop470\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 471,\n \"path\": \"/dev/loop471\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 472,\n \"path\": \"/dev/loop472\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 473,\n \"path\": \"/dev/loop473\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 474,\n \"path\": \"/dev/loop474\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 475,\n \"path\": \"/dev/loop475\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 476,\n \"path\": \"/dev/loop476\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 477,\n \"path\": \"/dev/loop477\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 478,\n \"path\": \"/dev/loop478\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 479,\n \"path\": \"/dev/loop479\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 480,\n \"path\": \"/dev/loop480\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 481,\n \"path\": \"/dev/loop481\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 482,\n \"path\": \"/dev/loop482\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 483,\n \"path\": \"/dev/loop483\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 484,\n \"path\": \"/dev/loop484\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 485,\n \"path\": \"/dev/loop485\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 486,\n \"path\": \"/dev/loop486\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 487,\n \"path\": \"/dev/loop487\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 488,\n \"path\": \"/dev/loop488\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 489,\n \"path\": \"/dev/loop489\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 490,\n \"path\": \"/dev/loop490\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 491,\n \"path\": \"/dev/loop491\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 492,\n \"path\": \"/dev/loop492\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 493,\n \"path\": \"/dev/loop493\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 494,\n \"path\": \"/dev/loop494\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 495,\n \"path\": \"/dev/loop495\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 496,\n \"path\": \"/dev/loop496\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 497,\n \"path\": \"/dev/loop497\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 498,\n \"path\": \"/dev/loop498\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 499,\n \"path\": \"/dev/loop499\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 500,\n \"path\": \"/dev/loop500\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 501,\n \"path\": \"/dev/loop501\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 502,\n \"path\": \"/dev/loop502\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 503,\n \"path\": \"/dev/loop503\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 504,\n \"path\": \"/dev/loop504\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 505,\n \"path\": \"/dev/loop505\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 506,\n \"path\": \"/dev/loop506\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 507,\n \"path\": \"/dev/loop507\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 508,\n \"path\": \"/dev/loop508\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 509,\n \"path\": \"/dev/loop509\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 510,\n \"path\": \"/dev/loop510\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 511,\n \"path\": \"/dev/loop511\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 512,\n \"path\": \"/dev/loop512\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 513,\n \"path\": \"/dev/loop513\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 514,\n \"path\": \"/dev/loop514\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 515,\n \"path\": \"/dev/loop515\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 516,\n \"path\": \"/dev/loop516\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 517,\n \"path\": \"/dev/loop517\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 518,\n \"path\": \"/dev/loop518\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 519,\n \"path\": \"/dev/loop519\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 520,\n \"path\": \"/dev/loop520\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 521,\n \"path\": \"/dev/loop521\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 522,\n \"path\": \"/dev/loop522\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 523,\n \"path\": \"/dev/loop523\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 524,\n \"path\": \"/dev/loop524\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 525,\n \"path\": \"/dev/loop525\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 526,\n \"path\": \"/dev/loop526\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 527,\n \"path\": \"/dev/loop527\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 528,\n \"path\": \"/dev/loop528\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 529,\n \"path\": \"/dev/loop529\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 530,\n \"path\": \"/dev/loop530\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 531,\n \"path\": \"/dev/loop531\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 532,\n \"path\": \"/dev/loop532\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 533,\n \"path\": \"/dev/loop533\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 534,\n \"path\": \"/dev/loop534\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 535,\n \"path\": \"/dev/loop535\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 536,\n \"path\": \"/dev/loop536\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 537,\n \"path\": \"/dev/loop537\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 538,\n \"path\": \"/dev/loop538\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 539,\n \"path\": \"/dev/loop539\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 540,\n \"path\": \"/dev/loop540\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 541,\n \"path\": \"/dev/loop541\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 542,\n \"path\": \"/dev/loop542\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 543,\n \"path\": \"/dev/loop543\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 544,\n \"path\": \"/dev/loop544\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 545,\n \"path\": \"/dev/loop545\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 546,\n \"path\": \"/dev/loop546\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 547,\n \"path\": \"/dev/loop547\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 548,\n \"path\": \"/dev/loop548\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 549,\n \"path\": \"/dev/loop549\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 550,\n \"path\": \"/dev/loop550\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 551,\n \"path\": \"/dev/loop551\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 552,\n \"path\": \"/dev/loop552\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 553,\n \"path\": \"/dev/loop553\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 554,\n \"path\": \"/dev/loop554\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 555,\n \"path\": \"/dev/loop555\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 556,\n \"path\": \"/dev/loop556\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 557,\n \"path\": \"/dev/loop557\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 558,\n \"path\": \"/dev/loop558\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 559,\n \"path\": \"/dev/loop559\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 560,\n \"path\": \"/dev/loop560\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 561,\n \"path\": \"/dev/loop561\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 562,\n \"path\": \"/dev/loop562\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 563,\n \"path\": \"/dev/loop563\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 564,\n \"path\": \"/dev/loop564\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 565,\n \"path\": \"/dev/loop565\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 566,\n \"path\": \"/dev/loop566\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 567,\n \"path\": \"/dev/loop567\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 568,\n \"path\": \"/dev/loop568\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 569,\n \"path\": \"/dev/loop569\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 570,\n \"path\": \"/dev/loop570\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 571,\n \"path\": \"/dev/loop571\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 572,\n \"path\": \"/dev/loop572\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 573,\n \"path\": \"/dev/loop573\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 574,\n \"path\": \"/dev/loop574\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 575,\n \"path\": \"/dev/loop575\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 576,\n \"path\": \"/dev/loop576\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 577,\n \"path\": \"/dev/loop577\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 578,\n \"path\": \"/dev/loop578\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 579,\n \"path\": \"/dev/loop579\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 580,\n \"path\": \"/dev/loop580\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 581,\n \"path\": \"/dev/loop581\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 582,\n \"path\": \"/dev/loop582\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 583,\n \"path\": \"/dev/loop583\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 584,\n \"path\": \"/dev/loop584\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 585,\n \"path\": \"/dev/loop585\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 586,\n \"path\": \"/dev/loop586\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 587,\n \"path\": \"/dev/loop587\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 588,\n \"path\": \"/dev/loop588\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 589,\n \"path\": \"/dev/loop589\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 590,\n \"path\": \"/dev/loop590\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 591,\n \"path\": \"/dev/loop591\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 592,\n \"path\": \"/dev/loop592\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 593,\n \"path\": \"/dev/loop593\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 594,\n \"path\": \"/dev/loop594\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 595,\n \"path\": \"/dev/loop595\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 596,\n \"path\": \"/dev/loop596\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 597,\n \"path\": \"/dev/loop597\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 598,\n \"path\": \"/dev/loop598\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 599,\n \"path\": \"/dev/loop599\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 600,\n \"path\": \"/dev/loop600\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 601,\n \"path\": \"/dev/loop601\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 602,\n \"path\": \"/dev/loop602\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 603,\n \"path\": \"/dev/loop603\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 604,\n \"path\": \"/dev/loop604\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 605,\n \"path\": \"/dev/loop605\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 606,\n \"path\": \"/dev/loop606\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 607,\n \"path\": \"/dev/loop607\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 608,\n \"path\": \"/dev/loop608\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 609,\n \"path\": \"/dev/loop609\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 610,\n \"path\": \"/dev/loop610\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 611,\n \"path\": \"/dev/loop611\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 612,\n \"path\": \"/dev/loop612\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 613,\n \"path\": \"/dev/loop613\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 614,\n \"path\": \"/dev/loop614\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 615,\n \"path\": \"/dev/loop615\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 616,\n \"path\": \"/dev/loop616\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 617,\n \"path\": \"/dev/loop617\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 618,\n \"path\": \"/dev/loop618\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 619,\n \"path\": \"/dev/loop619\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 620,\n \"path\": \"/dev/loop620\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 621,\n \"path\": \"/dev/loop621\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 622,\n \"path\": \"/dev/loop622\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 623,\n \"path\": \"/dev/loop623\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 624,\n \"path\": \"/dev/loop624\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 625,\n \"path\": \"/dev/loop625\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 626,\n \"path\": \"/dev/loop626\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 627,\n \"path\": \"/dev/loop627\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 628,\n \"path\": \"/dev/loop628\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 629,\n \"path\": \"/dev/loop629\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 630,\n \"path\": \"/dev/loop630\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 631,\n \"path\": \"/dev/loop631\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 632,\n \"path\": \"/dev/loop632\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 633,\n \"path\": \"/dev/loop633\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 634,\n \"path\": \"/dev/loop634\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 635,\n \"path\": \"/dev/loop635\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 636,\n \"path\": \"/dev/loop636\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 637,\n \"path\": \"/dev/loop637\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 638,\n \"path\": \"/dev/loop638\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 639,\n \"path\": \"/dev/loop639\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 640,\n \"path\": \"/dev/loop640\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 641,\n \"path\": \"/dev/loop641\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 642,\n \"path\": \"/dev/loop642\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 643,\n \"path\": \"/dev/loop643\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 644,\n \"path\": \"/dev/loop644\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 645,\n \"path\": \"/dev/loop645\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 646,\n \"path\": \"/dev/loop646\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 647,\n \"path\": \"/dev/loop647\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 648,\n \"path\": \"/dev/loop648\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 649,\n \"path\": \"/dev/loop649\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 650,\n \"path\": \"/dev/loop650\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 651,\n \"path\": \"/dev/loop651\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 652,\n \"path\": \"/dev/loop652\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 653,\n \"path\": \"/dev/loop653\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 654,\n \"path\": \"/dev/loop654\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 655,\n \"path\": \"/dev/loop655\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 656,\n \"path\": \"/dev/loop656\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 657,\n \"path\": \"/dev/loop657\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 658,\n \"path\": \"/dev/loop658\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 659,\n \"path\": \"/dev/loop659\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 660,\n \"path\": \"/dev/loop660\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 661,\n \"path\": \"/dev/loop661\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 662,\n \"path\": \"/dev/loop662\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 663,\n \"path\": \"/dev/loop663\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 664,\n \"path\": \"/dev/loop664\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 665,\n \"path\": \"/dev/loop665\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 666,\n \"path\": \"/dev/loop666\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 667,\n \"path\": \"/dev/loop667\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 668,\n \"path\": \"/dev/loop668\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 669,\n \"path\": \"/dev/loop669\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 670,\n \"path\": \"/dev/loop670\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 671,\n \"path\": \"/dev/loop671\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 672,\n \"path\": \"/dev/loop672\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 673,\n \"path\": \"/dev/loop673\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 674,\n \"path\": \"/dev/loop674\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 675,\n \"path\": \"/dev/loop675\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 676,\n \"path\": \"/dev/loop676\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 677,\n \"path\": \"/dev/loop677\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 678,\n \"path\": \"/dev/loop678\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 679,\n \"path\": \"/dev/loop679\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 680,\n \"path\": \"/dev/loop680\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 681,\n \"path\": \"/dev/loop681\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 682,\n \"path\": \"/dev/loop682\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 683,\n \"path\": \"/dev/loop683\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 684,\n \"path\": \"/dev/loop684\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 685,\n \"path\": \"/dev/loop685\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 686,\n \"path\": \"/dev/loop686\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 687,\n \"path\": \"/dev/loop687\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 688,\n \"path\": \"/dev/loop688\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 689,\n \"path\": \"/dev/loop689\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 690,\n \"path\": \"/dev/loop690\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 691,\n \"path\": \"/dev/loop691\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 692,\n \"path\": \"/dev/loop692\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 693,\n \"path\": \"/dev/loop693\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 694,\n \"path\": \"/dev/loop694\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 695,\n \"path\": \"/dev/loop695\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 696,\n \"path\": \"/dev/loop696\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 697,\n \"path\": \"/dev/loop697\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 698,\n \"path\": \"/dev/loop698\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 699,\n \"path\": \"/dev/loop699\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 700,\n \"path\": \"/dev/loop700\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 701,\n \"path\": \"/dev/loop701\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 702,\n \"path\": \"/dev/loop702\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 703,\n \"path\": \"/dev/loop703\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 704,\n \"path\": \"/dev/loop704\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 705,\n \"path\": \"/dev/loop705\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 706,\n \"path\": \"/dev/loop706\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 707,\n \"path\": \"/dev/loop707\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 708,\n \"path\": \"/dev/loop708\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 709,\n \"path\": \"/dev/loop709\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 710,\n \"path\": \"/dev/loop710\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 711,\n \"path\": \"/dev/loop711\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 712,\n \"path\": \"/dev/loop712\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 713,\n \"path\": \"/dev/loop713\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 714,\n \"path\": \"/dev/loop714\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 715,\n \"path\": \"/dev/loop715\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 716,\n \"path\": \"/dev/loop716\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 717,\n \"path\": \"/dev/loop717\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 718,\n \"path\": \"/dev/loop718\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 719,\n \"path\": \"/dev/loop719\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 720,\n \"path\": \"/dev/loop720\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 721,\n \"path\": \"/dev/loop721\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 722,\n \"path\": \"/dev/loop722\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 723,\n \"path\": \"/dev/loop723\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 724,\n \"path\": \"/dev/loop724\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 725,\n \"path\": \"/dev/loop725\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 726,\n \"path\": \"/dev/loop726\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 727,\n \"path\": \"/dev/loop727\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 728,\n \"path\": \"/dev/loop728\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 729,\n \"path\": \"/dev/loop729\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 730,\n \"path\": \"/dev/loop730\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 731,\n \"path\": \"/dev/loop731\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 732,\n \"path\": \"/dev/loop732\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 733,\n \"path\": \"/dev/loop733\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 734,\n \"path\": \"/dev/loop734\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 735,\n \"path\": \"/dev/loop735\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 736,\n \"path\": \"/dev/loop736\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 737,\n \"path\": \"/dev/loop737\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 738,\n \"path\": \"/dev/loop738\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 739,\n \"path\": \"/dev/loop739\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 740,\n \"path\": \"/dev/loop740\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 741,\n \"path\": \"/dev/loop741\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 742,\n \"path\": \"/dev/loop742\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 743,\n \"path\": \"/dev/loop743\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 744,\n \"path\": \"/dev/loop744\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 745,\n \"path\": \"/dev/loop745\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 746,\n \"path\": \"/dev/loop746\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 747,\n \"path\": \"/dev/loop747\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 748,\n \"path\": \"/dev/loop748\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 749,\n \"path\": \"/dev/loop749\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 750,\n \"path\": \"/dev/loop750\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 751,\n \"path\": \"/dev/loop751\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 752,\n \"path\": \"/dev/loop752\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 753,\n \"path\": \"/dev/loop753\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 754,\n \"path\": \"/dev/loop754\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 755,\n \"path\": \"/dev/loop755\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 756,\n \"path\": \"/dev/loop756\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 757,\n \"path\": \"/dev/loop757\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 758,\n \"path\": \"/dev/loop758\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 759,\n \"path\": \"/dev/loop759\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 760,\n \"path\": \"/dev/loop760\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 761,\n \"path\": \"/dev/loop761\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 762,\n \"path\": \"/dev/loop762\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 763,\n \"path\": \"/dev/loop763\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 764,\n \"path\": \"/dev/loop764\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 765,\n \"path\": \"/dev/loop765\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 766,\n \"path\": \"/dev/loop766\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 767,\n \"path\": \"/dev/loop767\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 768,\n \"path\": \"/dev/loop768\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 769,\n \"path\": \"/dev/loop769\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 770,\n \"path\": \"/dev/loop770\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 771,\n \"path\": \"/dev/loop771\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 772,\n \"path\": \"/dev/loop772\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 773,\n \"path\": \"/dev/loop773\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 774,\n \"path\": \"/dev/loop774\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 775,\n \"path\": \"/dev/loop775\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 776,\n \"path\": \"/dev/loop776\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 777,\n \"path\": \"/dev/loop777\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 778,\n \"path\": \"/dev/loop778\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 779,\n \"path\": \"/dev/loop779\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 780,\n \"path\": \"/dev/loop780\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 781,\n \"path\": \"/dev/loop781\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 782,\n \"path\": \"/dev/loop782\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 783,\n \"path\": \"/dev/loop783\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 784,\n \"path\": \"/dev/loop784\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 785,\n \"path\": \"/dev/loop785\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 786,\n \"path\": \"/dev/loop786\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 787,\n \"path\": \"/dev/loop787\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 788,\n \"path\": \"/dev/loop788\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 789,\n \"path\": \"/dev/loop789\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 790,\n \"path\": \"/dev/loop790\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 791,\n \"path\": \"/dev/loop791\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 792,\n \"path\": \"/dev/loop792\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 793,\n \"path\": \"/dev/loop793\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 794,\n \"path\": \"/dev/loop794\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 795,\n \"path\": \"/dev/loop795\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 796,\n \"path\": \"/dev/loop796\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 797,\n \"path\": \"/dev/loop797\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 798,\n \"path\": \"/dev/loop798\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 799,\n \"path\": \"/dev/loop799\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 800,\n \"path\": \"/dev/loop800\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 801,\n \"path\": \"/dev/loop801\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 802,\n \"path\": \"/dev/loop802\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 803,\n \"path\": \"/dev/loop803\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 804,\n \"path\": \"/dev/loop804\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 805,\n \"path\": \"/dev/loop805\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 806,\n \"path\": \"/dev/loop806\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 807,\n \"path\": \"/dev/loop807\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 808,\n \"path\": \"/dev/loop808\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 809,\n \"path\": \"/dev/loop809\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 810,\n \"path\": \"/dev/loop810\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 811,\n \"path\": \"/dev/loop811\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 812,\n \"path\": \"/dev/loop812\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 813,\n \"path\": \"/dev/loop813\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 814,\n \"path\": \"/dev/loop814\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 815,\n \"path\": \"/dev/loop815\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 816,\n \"path\": \"/dev/loop816\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 817,\n \"path\": \"/dev/loop817\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 818,\n \"path\": \"/dev/loop818\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 819,\n \"path\": \"/dev/loop819\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 820,\n \"path\": \"/dev/loop820\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 821,\n \"path\": \"/dev/loop821\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 822,\n \"path\": \"/dev/loop822\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 823,\n \"path\": \"/dev/loop823\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 824,\n \"path\": \"/dev/loop824\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 825,\n \"path\": \"/dev/loop825\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 826,\n \"path\": \"/dev/loop826\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 827,\n \"path\": \"/dev/loop827\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 828,\n \"path\": \"/dev/loop828\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 829,\n \"path\": \"/dev/loop829\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 830,\n \"path\": \"/dev/loop830\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 831,\n \"path\": \"/dev/loop831\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 832,\n \"path\": \"/dev/loop832\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 833,\n \"path\": \"/dev/loop833\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 834,\n \"path\": \"/dev/loop834\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 835,\n \"path\": \"/dev/loop835\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 836,\n \"path\": \"/dev/loop836\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 837,\n \"path\": \"/dev/loop837\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 838,\n \"path\": \"/dev/loop838\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 839,\n \"path\": \"/dev/loop839\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 840,\n \"path\": \"/dev/loop840\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 841,\n \"path\": \"/dev/loop841\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 842,\n \"path\": \"/dev/loop842\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 843,\n \"path\": \"/dev/loop843\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 844,\n \"path\": \"/dev/loop844\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 845,\n \"path\": \"/dev/loop845\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 846,\n \"path\": \"/dev/loop846\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 847,\n \"path\": \"/dev/loop847\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 848,\n \"path\": \"/dev/loop848\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 849,\n \"path\": \"/dev/loop849\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 850,\n \"path\": \"/dev/loop850\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 851,\n \"path\": \"/dev/loop851\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 852,\n \"path\": \"/dev/loop852\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 853,\n \"path\": \"/dev/loop853\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 854,\n \"path\": \"/dev/loop854\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 855,\n \"path\": \"/dev/loop855\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 856,\n \"path\": \"/dev/loop856\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 857,\n \"path\": \"/dev/loop857\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 858,\n \"path\": \"/dev/loop858\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 859,\n \"path\": \"/dev/loop859\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 860,\n \"path\": \"/dev/loop860\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 861,\n \"path\": \"/dev/loop861\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 862,\n \"path\": \"/dev/loop862\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 863,\n \"path\": \"/dev/loop863\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 864,\n \"path\": \"/dev/loop864\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 865,\n \"path\": \"/dev/loop865\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 866,\n \"path\": \"/dev/loop866\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 867,\n \"path\": \"/dev/loop867\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 868,\n \"path\": \"/dev/loop868\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 869,\n \"path\": \"/dev/loop869\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 870,\n \"path\": \"/dev/loop870\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 871,\n \"path\": \"/dev/loop871\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 872,\n \"path\": \"/dev/loop872\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 873,\n \"path\": \"/dev/loop873\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 874,\n \"path\": \"/dev/loop874\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 875,\n \"path\": \"/dev/loop875\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 876,\n \"path\": \"/dev/loop876\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 877,\n \"path\": \"/dev/loop877\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 878,\n \"path\": \"/dev/loop878\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 879,\n \"path\": \"/dev/loop879\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 880,\n \"path\": \"/dev/loop880\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 881,\n \"path\": \"/dev/loop881\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 882,\n \"path\": \"/dev/loop882\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 883,\n \"path\": \"/dev/loop883\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 884,\n \"path\": \"/dev/loop884\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 885,\n \"path\": \"/dev/loop885\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 886,\n \"path\": \"/dev/loop886\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 887,\n \"path\": \"/dev/loop887\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 888,\n \"path\": \"/dev/loop888\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 889,\n \"path\": \"/dev/loop889\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 890,\n \"path\": \"/dev/loop890\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 891,\n \"path\": \"/dev/loop891\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 892,\n \"path\": \"/dev/loop892\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 893,\n \"path\": \"/dev/loop893\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 894,\n \"path\": \"/dev/loop894\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 895,\n \"path\": \"/dev/loop895\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 896,\n \"path\": \"/dev/loop896\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 897,\n \"path\": \"/dev/loop897\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 898,\n \"path\": \"/dev/loop898\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 899,\n \"path\": \"/dev/loop899\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 900,\n \"path\": \"/dev/loop900\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 901,\n \"path\": \"/dev/loop901\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 902,\n \"path\": \"/dev/loop902\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 903,\n \"path\": \"/dev/loop903\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 904,\n \"path\": \"/dev/loop904\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 905,\n \"path\": \"/dev/loop905\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 906,\n \"path\": \"/dev/loop906\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 907,\n \"path\": \"/dev/loop907\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 908,\n \"path\": \"/dev/loop908\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 909,\n \"path\": \"/dev/loop909\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 910,\n \"path\": \"/dev/loop910\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 911,\n \"path\": \"/dev/loop911\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 912,\n \"path\": \"/dev/loop912\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 913,\n \"path\": \"/dev/loop913\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 914,\n \"path\": \"/dev/loop914\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 915,\n \"path\": \"/dev/loop915\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 916,\n \"path\": \"/dev/loop916\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 917,\n \"path\": \"/dev/loop917\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 918,\n \"path\": \"/dev/loop918\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 919,\n \"path\": \"/dev/loop919\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 920,\n \"path\": \"/dev/loop920\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 921,\n \"path\": \"/dev/loop921\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 922,\n \"path\": \"/dev/loop922\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 923,\n \"path\": \"/dev/loop923\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 924,\n \"path\": \"/dev/loop924\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 925,\n \"path\": \"/dev/loop925\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 926,\n \"path\": \"/dev/loop926\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 927,\n \"path\": \"/dev/loop927\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 928,\n \"path\": \"/dev/loop928\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 929,\n \"path\": \"/dev/loop929\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 930,\n \"path\": \"/dev/loop930\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 931,\n \"path\": \"/dev/loop931\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 932,\n \"path\": \"/dev/loop932\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 933,\n \"path\": \"/dev/loop933\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 934,\n \"path\": \"/dev/loop934\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 935,\n \"path\": \"/dev/loop935\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 936,\n \"path\": \"/dev/loop936\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 937,\n \"path\": \"/dev/loop937\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 938,\n \"path\": \"/dev/loop938\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 939,\n \"path\": \"/dev/loop939\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 940,\n \"path\": \"/dev/loop940\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 941,\n \"path\": \"/dev/loop941\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 942,\n \"path\": \"/dev/loop942\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 943,\n \"path\": \"/dev/loop943\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 944,\n \"path\": \"/dev/loop944\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 945,\n \"path\": \"/dev/loop945\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 946,\n \"path\": \"/dev/loop946\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 947,\n \"path\": \"/dev/loop947\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 948,\n \"path\": \"/dev/loop948\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 949,\n \"path\": \"/dev/loop949\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 950,\n \"path\": \"/dev/loop950\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 951,\n \"path\": \"/dev/loop951\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 952,\n \"path\": \"/dev/loop952\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 953,\n \"path\": \"/dev/loop953\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 954,\n \"path\": \"/dev/loop954\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 955,\n \"path\": \"/dev/loop955\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 956,\n \"path\": \"/dev/loop956\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 957,\n \"path\": \"/dev/loop957\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 958,\n \"path\": \"/dev/loop958\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 959,\n \"path\": \"/dev/loop959\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 960,\n \"path\": \"/dev/loop960\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 961,\n \"path\": \"/dev/loop961\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 962,\n \"path\": \"/dev/loop962\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 963,\n \"path\": \"/dev/loop963\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 964,\n \"path\": \"/dev/loop964\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 965,\n \"path\": \"/dev/loop965\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 966,\n \"path\": \"/dev/loop966\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 967,\n \"path\": \"/dev/loop967\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 968,\n \"path\": \"/dev/loop968\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 969,\n \"path\": \"/dev/loop969\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 970,\n \"path\": \"/dev/loop970\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 971,\n \"path\": \"/dev/loop971\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 972,\n \"path\": \"/dev/loop972\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 973,\n \"path\": \"/dev/loop973\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 974,\n \"path\": \"/dev/loop974\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 975,\n \"path\": \"/dev/loop975\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 976,\n \"path\": \"/dev/loop976\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 977,\n \"path\": \"/dev/loop977\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 978,\n \"path\": \"/dev/loop978\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 979,\n \"path\": \"/dev/loop979\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 980,\n \"path\": \"/dev/loop980\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 981,\n \"path\": \"/dev/loop981\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 982,\n \"path\": \"/dev/loop982\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 983,\n \"path\": \"/dev/loop983\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 984,\n \"path\": \"/dev/loop984\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 985,\n \"path\": \"/dev/loop985\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 986,\n \"path\": \"/dev/loop986\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 987,\n \"path\": \"/dev/loop987\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 988,\n \"path\": \"/dev/loop988\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 989,\n \"path\": \"/dev/loop989\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 990,\n \"path\": \"/dev/loop990\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 991,\n \"path\": \"/dev/loop991\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 992,\n \"path\": \"/dev/loop992\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 993,\n \"path\": \"/dev/loop993\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 994,\n \"path\": \"/dev/loop994\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 995,\n \"path\": \"/dev/loop995\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 996,\n \"path\": \"/dev/loop996\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 997,\n \"path\": \"/dev/loop997\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 998,\n \"path\": \"/dev/loop998\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 7,\n \"minor\": 999,\n \"path\": \"/dev/loop999\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"path\": \"/proc/2601744/ns/pid\",\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2601744/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2601744/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2601744/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/proc\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/host\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/run/systemd/\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/run/systemd\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/bash\",\n \"-c\",\n \"CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \\\"/containerd\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\nif [ -n \\\"$CONTAINERD_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\\nelse\\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \\\"/crio\\\\.sock\\\\s\\\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\\n if [ -n \\\"$CRIO_SOCKET_DIR\\\" ]; then\\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\\n fi\\nfi\\nsleep infinity\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker2\",\n \"CRI_VERSION=v1.32.0\",\n \"RUNC_VERSION=v1.2.6\",\n \"NCTL_VERSION=2.0.4\",\n \"CTR_VERSION=2.0.4\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f\",\n \"snapshotKey\": \"2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1f010140\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:00:06.808821325Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/lfncnti/cluster-tools:v1.0.8\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"cluster-tools\",\n \"io.kubernetes.pod.name\": \"cluster-tools-2gwh4\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"55aab1ee-161d-4716-bd96-2d596290bbb8\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_cluster-tools-2gwh4_55aab1ee-161d-4716-bd96-2d596290bbb8/cluster-tools/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"cluster-tools\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/run/systemd/\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/systemd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/proc\",\n \"gidMappings\": [],\n \"hostPath\": \"/proc\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/host\",\n \"gidMappings\": [],\n \"hostPath\": \"/\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:00:07.20383242Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:32Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:32Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:32] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "envs": [ { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" } ], "image": { "image": "sha256:a1a9bc9c023404b679a0e6f477945663006c78ea6c3b5822a3b827865dbc311f", "user_specified_image": "lfncnti/cluster-tools:v1.0.8" }, "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-2gwh4", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "55aab1ee-161d-4716-bd96-2d596290bbb8" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 2 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "cluster-tools/0.log", "metadata": { "name": "cluster-tools" }, "mounts": [ { "container_path": "/run/systemd/", "host_path": "/run/systemd", "readonly": true }, { "container_path": "/proc", "host_path": "/proc" }, { "container_path": "/host", "host_path": "/" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02" } ] }, "pid": 2601770, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "cluster-tools", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "lfncnti/cluster-tools:v1.0.8", "io.kubernetes.cri.sandbox-id": "7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f", "io.kubernetes.cri.sandbox-name": "cluster-tools-2gwh4", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "55aab1ee-161d-4716-bd96-2d596290bbb8" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod55aab1ee_161d_4716_bd96_2d596290bbb8.slice:cri-containerd:2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 1000, "path": "/dev/loop1000", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 128, "path": "/dev/loop128", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 129, "path": "/dev/loop129", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 130, "path": "/dev/loop130", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 131, "path": "/dev/loop131", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 132, "path": "/dev/loop132", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 133, "path": "/dev/loop133", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 134, "path": "/dev/loop134", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 135, "path": "/dev/loop135", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 136, "path": "/dev/loop136", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 137, "path": "/dev/loop137", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 138, "path": "/dev/loop138", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 139, "path": "/dev/loop139", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 140, "path": "/dev/loop140", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 141, "path": "/dev/loop141", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 142, "path": "/dev/loop142", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 143, "path": "/dev/loop143", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 144, "path": "/dev/loop144", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 145, "path": "/dev/loop145", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 146, "path": "/dev/loop146", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 147, "path": "/dev/loop147", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 148, "path": "/dev/loop148", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 149, "path": "/dev/loop149", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 150, "path": "/dev/loop150", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 151, "path": "/dev/loop151", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 152, "path": "/dev/loop152", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 153, "path": "/dev/loop153", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 154, "path": "/dev/loop154", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 155, "path": "/dev/loop155", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 156, "path": "/dev/loop156", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 157, "path": "/dev/loop157", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 158, "path": "/dev/loop158", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 159, "path": "/dev/loop159", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 160, "path": "/dev/loop160", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 161, "path": "/dev/loop161", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 162, "path": "/dev/loop162", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 163, "path": "/dev/loop163", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 164, "path": "/dev/loop164", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 165, "path": "/dev/loop165", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 166, "path": "/dev/loop166", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 167, "path": "/dev/loop167", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 168, "path": "/dev/loop168", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 169, "path": "/dev/loop169", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 170, "path": "/dev/loop170", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 171, "path": "/dev/loop171", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 172, "path": "/dev/loop172", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 173, "path": "/dev/loop173", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 174, "path": "/dev/loop174", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 175, "path": "/dev/loop175", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 176, "path": "/dev/loop176", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 177, "path": "/dev/loop177", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 178, "path": "/dev/loop178", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 179, "path": "/dev/loop179", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 180, "path": "/dev/loop180", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 181, "path": "/dev/loop181", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 182, "path": "/dev/loop182", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 183, "path": "/dev/loop183", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 184, "path": "/dev/loop184", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 185, "path": "/dev/loop185", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 186, "path": "/dev/loop186", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 187, "path": "/dev/loop187", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 188, "path": "/dev/loop188", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 189, "path": "/dev/loop189", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 190, "path": "/dev/loop190", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 191, "path": "/dev/loop191", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 192, "path": "/dev/loop192", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 193, "path": "/dev/loop193", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 194, "path": "/dev/loop194", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 195, "path": "/dev/loop195", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 196, "path": "/dev/loop196", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 197, "path": "/dev/loop197", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 198, "path": "/dev/loop198", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 199, "path": "/dev/loop199", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 200, "path": "/dev/loop200", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 201, "path": "/dev/loop201", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 202, "path": "/dev/loop202", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 203, "path": "/dev/loop203", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 204, "path": "/dev/loop204", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 205, "path": "/dev/loop205", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 206, "path": "/dev/loop206", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 207, "path": "/dev/loop207", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 208, "path": "/dev/loop208", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 209, "path": "/dev/loop209", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 210, "path": "/dev/loop210", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 211, "path": "/dev/loop211", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 212, "path": "/dev/loop212", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 213, "path": "/dev/loop213", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 214, "path": "/dev/loop214", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 215, "path": "/dev/loop215", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 216, "path": "/dev/loop216", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 217, "path": "/dev/loop217", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 218, "path": "/dev/loop218", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 219, "path": "/dev/loop219", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 220, "path": "/dev/loop220", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 221, "path": "/dev/loop221", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 222, "path": "/dev/loop222", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 223, "path": "/dev/loop223", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 224, "path": "/dev/loop224", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 225, "path": "/dev/loop225", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 226, "path": "/dev/loop226", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 227, "path": "/dev/loop227", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 228, "path": "/dev/loop228", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 229, "path": "/dev/loop229", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 230, "path": "/dev/loop230", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 231, "path": "/dev/loop231", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 232, "path": "/dev/loop232", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 233, "path": "/dev/loop233", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 234, "path": "/dev/loop234", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 235, "path": "/dev/loop235", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 236, "path": "/dev/loop236", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 237, "path": "/dev/loop237", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 238, "path": "/dev/loop238", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 239, "path": "/dev/loop239", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 240, "path": "/dev/loop240", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 241, "path": "/dev/loop241", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 242, "path": "/dev/loop242", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 243, "path": "/dev/loop243", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 244, "path": "/dev/loop244", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 245, "path": "/dev/loop245", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 246, "path": "/dev/loop246", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 247, "path": "/dev/loop247", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 248, "path": "/dev/loop248", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 249, "path": "/dev/loop249", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 250, "path": "/dev/loop250", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 251, "path": "/dev/loop251", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 252, "path": "/dev/loop252", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 253, "path": "/dev/loop253", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 254, "path": "/dev/loop254", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 255, "path": "/dev/loop255", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 256, "path": "/dev/loop256", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 257, "path": "/dev/loop257", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 258, "path": "/dev/loop258", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 259, "path": "/dev/loop259", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 260, "path": "/dev/loop260", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 261, "path": "/dev/loop261", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 262, "path": "/dev/loop262", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 263, "path": "/dev/loop263", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 264, "path": "/dev/loop264", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 265, "path": "/dev/loop265", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 266, "path": "/dev/loop266", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 267, "path": "/dev/loop267", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 268, "path": "/dev/loop268", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 269, "path": "/dev/loop269", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 270, "path": "/dev/loop270", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 271, "path": "/dev/loop271", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 272, "path": "/dev/loop272", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 273, "path": "/dev/loop273", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 274, "path": "/dev/loop274", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 275, "path": "/dev/loop275", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 276, "path": "/dev/loop276", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 277, "path": "/dev/loop277", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 278, "path": "/dev/loop278", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 279, "path": "/dev/loop279", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 280, "path": "/dev/loop280", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 281, "path": "/dev/loop281", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 282, "path": "/dev/loop282", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 283, "path": "/dev/loop283", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 284, "path": "/dev/loop284", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 285, "path": "/dev/loop285", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 286, "path": "/dev/loop286", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 287, "path": "/dev/loop287", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 288, "path": "/dev/loop288", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 289, "path": "/dev/loop289", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 290, "path": "/dev/loop290", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 291, "path": "/dev/loop291", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 292, "path": "/dev/loop292", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 293, "path": "/dev/loop293", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 294, "path": "/dev/loop294", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 295, "path": "/dev/loop295", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 296, "path": "/dev/loop296", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 297, "path": "/dev/loop297", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 298, "path": "/dev/loop298", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 299, "path": "/dev/loop299", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 300, "path": "/dev/loop300", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 301, "path": "/dev/loop301", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 302, "path": "/dev/loop302", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 303, "path": "/dev/loop303", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 304, "path": "/dev/loop304", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 305, "path": "/dev/loop305", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 306, "path": "/dev/loop306", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 307, "path": "/dev/loop307", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 308, "path": "/dev/loop308", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 309, "path": "/dev/loop309", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 310, "path": "/dev/loop310", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 311, "path": "/dev/loop311", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 312, "path": "/dev/loop312", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 313, "path": "/dev/loop313", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 314, "path": "/dev/loop314", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 315, "path": "/dev/loop315", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 316, "path": "/dev/loop316", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 317, "path": "/dev/loop317", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 318, "path": "/dev/loop318", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 319, "path": "/dev/loop319", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 320, "path": "/dev/loop320", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 321, "path": "/dev/loop321", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 322, "path": "/dev/loop322", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 323, "path": "/dev/loop323", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 324, "path": "/dev/loop324", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 325, "path": "/dev/loop325", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 326, "path": "/dev/loop326", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 327, "path": "/dev/loop327", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 328, "path": "/dev/loop328", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 329, "path": "/dev/loop329", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 330, "path": "/dev/loop330", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 331, "path": "/dev/loop331", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 332, "path": "/dev/loop332", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 333, "path": "/dev/loop333", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 334, "path": "/dev/loop334", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 335, "path": "/dev/loop335", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 336, "path": "/dev/loop336", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 337, "path": "/dev/loop337", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 338, "path": "/dev/loop338", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 339, "path": "/dev/loop339", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 340, "path": "/dev/loop340", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 341, "path": "/dev/loop341", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 342, "path": "/dev/loop342", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 343, "path": "/dev/loop343", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 344, "path": "/dev/loop344", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 345, "path": "/dev/loop345", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 346, "path": "/dev/loop346", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 347, "path": "/dev/loop347", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 348, "path": "/dev/loop348", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 349, "path": "/dev/loop349", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 350, "path": "/dev/loop350", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 351, "path": "/dev/loop351", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 352, "path": "/dev/loop352", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 353, "path": "/dev/loop353", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 354, "path": "/dev/loop354", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 355, "path": "/dev/loop355", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 356, "path": "/dev/loop356", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 357, "path": "/dev/loop357", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 358, "path": "/dev/loop358", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 359, "path": "/dev/loop359", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 360, "path": "/dev/loop360", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 361, "path": "/dev/loop361", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 362, "path": "/dev/loop362", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 363, "path": "/dev/loop363", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 364, "path": "/dev/loop364", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 365, "path": "/dev/loop365", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 366, "path": "/dev/loop366", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 367, "path": "/dev/loop367", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 368, "path": "/dev/loop368", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 369, "path": "/dev/loop369", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 370, "path": "/dev/loop370", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 371, "path": "/dev/loop371", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 372, "path": "/dev/loop372", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 373, "path": "/dev/loop373", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 374, "path": "/dev/loop374", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 375, "path": "/dev/loop375", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 376, "path": "/dev/loop376", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 377, "path": "/dev/loop377", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 378, "path": "/dev/loop378", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 379, "path": "/dev/loop379", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 380, "path": "/dev/loop380", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 381, "path": "/dev/loop381", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 382, "path": "/dev/loop382", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 383, "path": "/dev/loop383", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 384, "path": "/dev/loop384", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 385, "path": "/dev/loop385", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 386, "path": "/dev/loop386", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 387, "path": "/dev/loop387", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 388, "path": "/dev/loop388", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 389, "path": "/dev/loop389", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 390, "path": "/dev/loop390", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 391, "path": "/dev/loop391", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 392, "path": "/dev/loop392", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 393, "path": "/dev/loop393", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 394, "path": "/dev/loop394", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 395, "path": "/dev/loop395", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 396, "path": "/dev/loop396", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 397, "path": "/dev/loop397", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 398, "path": "/dev/loop398", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 399, "path": "/dev/loop399", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 400, "path": "/dev/loop400", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 401, "path": "/dev/loop401", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 402, "path": "/dev/loop402", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 403, "path": "/dev/loop403", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 404, "path": "/dev/loop404", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 405, "path": "/dev/loop405", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 406, "path": "/dev/loop406", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 407, "path": "/dev/loop407", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 408, "path": "/dev/loop408", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 409, "path": "/dev/loop409", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 410, "path": "/dev/loop410", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 411, "path": "/dev/loop411", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 412, "path": "/dev/loop412", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 413, "path": "/dev/loop413", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 414, "path": "/dev/loop414", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 415, "path": "/dev/loop415", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 416, "path": "/dev/loop416", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 417, "path": "/dev/loop417", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 418, "path": "/dev/loop418", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 419, "path": "/dev/loop419", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 420, "path": "/dev/loop420", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 421, "path": "/dev/loop421", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 422, "path": "/dev/loop422", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 423, "path": "/dev/loop423", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 424, "path": "/dev/loop424", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 425, "path": "/dev/loop425", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 426, "path": "/dev/loop426", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 427, "path": "/dev/loop427", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 428, "path": "/dev/loop428", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 429, "path": "/dev/loop429", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 430, "path": "/dev/loop430", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 431, "path": "/dev/loop431", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 432, "path": "/dev/loop432", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 433, "path": "/dev/loop433", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 434, "path": "/dev/loop434", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 435, "path": "/dev/loop435", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 436, "path": "/dev/loop436", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 437, "path": "/dev/loop437", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 438, "path": "/dev/loop438", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 439, "path": "/dev/loop439", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 440, "path": "/dev/loop440", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 441, "path": "/dev/loop441", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 442, "path": "/dev/loop442", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 443, "path": "/dev/loop443", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 444, "path": "/dev/loop444", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 445, "path": "/dev/loop445", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 446, "path": "/dev/loop446", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 447, "path": "/dev/loop447", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 448, "path": "/dev/loop448", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 449, "path": "/dev/loop449", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 450, "path": "/dev/loop450", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 451, "path": "/dev/loop451", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 452, "path": "/dev/loop452", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 453, "path": "/dev/loop453", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 454, "path": "/dev/loop454", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 455, "path": "/dev/loop455", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 456, "path": "/dev/loop456", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 457, "path": "/dev/loop457", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 458, "path": "/dev/loop458", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 459, "path": "/dev/loop459", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 460, "path": "/dev/loop460", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 461, "path": "/dev/loop461", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 462, "path": "/dev/loop462", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 463, "path": "/dev/loop463", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 464, "path": "/dev/loop464", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 465, "path": "/dev/loop465", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 466, "path": "/dev/loop466", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 467, "path": "/dev/loop467", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 468, "path": "/dev/loop468", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 469, "path": "/dev/loop469", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 470, "path": "/dev/loop470", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 471, "path": "/dev/loop471", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 472, "path": "/dev/loop472", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 473, "path": "/dev/loop473", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 474, "path": "/dev/loop474", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 475, "path": "/dev/loop475", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 476, "path": "/dev/loop476", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 477, "path": "/dev/loop477", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 478, "path": "/dev/loop478", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 479, "path": "/dev/loop479", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 480, "path": "/dev/loop480", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 481, "path": "/dev/loop481", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 482, "path": "/dev/loop482", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 483, "path": "/dev/loop483", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 484, "path": "/dev/loop484", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 485, "path": "/dev/loop485", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 486, "path": "/dev/loop486", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 487, "path": "/dev/loop487", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 488, "path": "/dev/loop488", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 489, "path": "/dev/loop489", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 490, "path": "/dev/loop490", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 491, "path": "/dev/loop491", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 492, "path": "/dev/loop492", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 493, "path": "/dev/loop493", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 494, "path": "/dev/loop494", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 495, "path": "/dev/loop495", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 496, "path": "/dev/loop496", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 497, "path": "/dev/loop497", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 498, "path": "/dev/loop498", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 499, "path": "/dev/loop499", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 500, "path": "/dev/loop500", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 501, "path": "/dev/loop501", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 502, "path": "/dev/loop502", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 503, "path": "/dev/loop503", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 504, "path": "/dev/loop504", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 505, "path": "/dev/loop505", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 506, "path": "/dev/loop506", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 507, "path": "/dev/loop507", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 508, "path": "/dev/loop508", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 509, "path": "/dev/loop509", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 510, "path": "/dev/loop510", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 511, "path": "/dev/loop511", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 512, "path": "/dev/loop512", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 513, "path": "/dev/loop513", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 514, "path": "/dev/loop514", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 515, "path": "/dev/loop515", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 516, "path": "/dev/loop516", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 517, "path": "/dev/loop517", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 518, "path": "/dev/loop518", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 519, "path": "/dev/loop519", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 520, "path": "/dev/loop520", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 521, "path": "/dev/loop521", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 522, "path": "/dev/loop522", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 523, "path": "/dev/loop523", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 524, "path": "/dev/loop524", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 525, "path": "/dev/loop525", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 526, "path": "/dev/loop526", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 527, "path": "/dev/loop527", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 528, "path": "/dev/loop528", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 529, "path": "/dev/loop529", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 530, "path": "/dev/loop530", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 531, "path": "/dev/loop531", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 532, "path": "/dev/loop532", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 533, "path": "/dev/loop533", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 534, "path": "/dev/loop534", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 535, "path": "/dev/loop535", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 536, "path": "/dev/loop536", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 537, "path": "/dev/loop537", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 538, "path": "/dev/loop538", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 539, "path": "/dev/loop539", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 540, "path": "/dev/loop540", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 541, "path": "/dev/loop541", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 542, "path": "/dev/loop542", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 543, "path": "/dev/loop543", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 544, "path": "/dev/loop544", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 545, "path": "/dev/loop545", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 546, "path": "/dev/loop546", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 547, "path": "/dev/loop547", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 548, "path": "/dev/loop548", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 549, "path": "/dev/loop549", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 550, "path": "/dev/loop550", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 551, "path": "/dev/loop551", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 552, "path": "/dev/loop552", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 553, "path": "/dev/loop553", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 554, "path": "/dev/loop554", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 555, "path": "/dev/loop555", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 556, "path": "/dev/loop556", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 557, "path": "/dev/loop557", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 558, "path": "/dev/loop558", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 559, "path": "/dev/loop559", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 560, "path": "/dev/loop560", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 561, "path": "/dev/loop561", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 562, "path": "/dev/loop562", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 563, "path": "/dev/loop563", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 564, "path": "/dev/loop564", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 565, "path": "/dev/loop565", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 566, "path": "/dev/loop566", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 567, "path": "/dev/loop567", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 568, "path": "/dev/loop568", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 569, "path": "/dev/loop569", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 570, "path": "/dev/loop570", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 571, "path": "/dev/loop571", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 572, "path": "/dev/loop572", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 573, "path": "/dev/loop573", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 574, "path": "/dev/loop574", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 575, "path": "/dev/loop575", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 576, "path": "/dev/loop576", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 577, "path": "/dev/loop577", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 578, "path": "/dev/loop578", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 579, "path": "/dev/loop579", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 580, "path": "/dev/loop580", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 581, "path": "/dev/loop581", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 582, "path": "/dev/loop582", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 583, "path": "/dev/loop583", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 584, "path": "/dev/loop584", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 585, "path": "/dev/loop585", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 586, "path": "/dev/loop586", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 587, "path": "/dev/loop587", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 588, "path": "/dev/loop588", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 589, "path": "/dev/loop589", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 590, "path": "/dev/loop590", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 591, "path": "/dev/loop591", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 592, "path": "/dev/loop592", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 593, "path": "/dev/loop593", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 594, "path": "/dev/loop594", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 595, "path": "/dev/loop595", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 596, "path": "/dev/loop596", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 597, "path": "/dev/loop597", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 598, "path": "/dev/loop598", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 599, "path": "/dev/loop599", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 600, "path": "/dev/loop600", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 601, "path": "/dev/loop601", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 602, "path": "/dev/loop602", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 603, "path": "/dev/loop603", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 604, "path": "/dev/loop604", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 605, "path": "/dev/loop605", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 606, "path": "/dev/loop606", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 607, "path": "/dev/loop607", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 608, "path": "/dev/loop608", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 609, "path": "/dev/loop609", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 610, "path": "/dev/loop610", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 611, "path": "/dev/loop611", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 612, "path": "/dev/loop612", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 613, "path": "/dev/loop613", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 614, "path": "/dev/loop614", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 615, "path": "/dev/loop615", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 616, "path": "/dev/loop616", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 617, "path": "/dev/loop617", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 618, "path": "/dev/loop618", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 619, "path": "/dev/loop619", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 620, "path": "/dev/loop620", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 621, "path": "/dev/loop621", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 622, "path": "/dev/loop622", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 623, "path": "/dev/loop623", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 624, "path": "/dev/loop624", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 625, "path": "/dev/loop625", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 626, "path": "/dev/loop626", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 627, "path": "/dev/loop627", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 628, "path": "/dev/loop628", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 629, "path": "/dev/loop629", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 630, "path": "/dev/loop630", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 631, "path": "/dev/loop631", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 632, "path": "/dev/loop632", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 633, "path": "/dev/loop633", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 634, "path": "/dev/loop634", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 635, "path": "/dev/loop635", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 636, "path": "/dev/loop636", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 637, "path": "/dev/loop637", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 638, "path": "/dev/loop638", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 639, "path": "/dev/loop639", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 640, "path": "/dev/loop640", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 641, "path": "/dev/loop641", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 642, "path": "/dev/loop642", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 643, "path": "/dev/loop643", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 644, "path": "/dev/loop644", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 645, "path": "/dev/loop645", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 646, "path": "/dev/loop646", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 647, "path": "/dev/loop647", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 648, "path": "/dev/loop648", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 649, "path": "/dev/loop649", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 650, "path": "/dev/loop650", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 651, "path": "/dev/loop651", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 652, "path": "/dev/loop652", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 653, "path": "/dev/loop653", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 654, "path": "/dev/loop654", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 655, "path": "/dev/loop655", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 656, "path": "/dev/loop656", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 657, "path": "/dev/loop657", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 658, "path": "/dev/loop658", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 659, "path": "/dev/loop659", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 660, "path": "/dev/loop660", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 661, "path": "/dev/loop661", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 662, "path": "/dev/loop662", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 663, "path": "/dev/loop663", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 664, "path": "/dev/loop664", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 665, "path": "/dev/loop665", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 666, "path": "/dev/loop666", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 667, "path": "/dev/loop667", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 668, "path": "/dev/loop668", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 669, "path": "/dev/loop669", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 670, "path": "/dev/loop670", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 671, "path": "/dev/loop671", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 672, "path": "/dev/loop672", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 673, "path": "/dev/loop673", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 674, "path": "/dev/loop674", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 675, "path": "/dev/loop675", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 676, "path": "/dev/loop676", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 677, "path": "/dev/loop677", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 678, "path": "/dev/loop678", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 679, "path": "/dev/loop679", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 680, "path": "/dev/loop680", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 681, "path": "/dev/loop681", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 682, "path": "/dev/loop682", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 683, "path": "/dev/loop683", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 684, "path": "/dev/loop684", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 685, "path": "/dev/loop685", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 686, "path": "/dev/loop686", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 687, "path": "/dev/loop687", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 688, "path": "/dev/loop688", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 689, "path": "/dev/loop689", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 690, "path": "/dev/loop690", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 691, "path": "/dev/loop691", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 692, "path": "/dev/loop692", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 693, "path": "/dev/loop693", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 694, "path": "/dev/loop694", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 695, "path": "/dev/loop695", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 696, "path": "/dev/loop696", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 697, "path": "/dev/loop697", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 698, "path": "/dev/loop698", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 699, "path": "/dev/loop699", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 700, "path": "/dev/loop700", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 701, "path": "/dev/loop701", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 702, "path": "/dev/loop702", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 703, "path": "/dev/loop703", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 704, "path": "/dev/loop704", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 705, "path": "/dev/loop705", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 706, "path": "/dev/loop706", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 707, "path": "/dev/loop707", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 708, "path": "/dev/loop708", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 709, "path": "/dev/loop709", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 710, "path": "/dev/loop710", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 711, "path": "/dev/loop711", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 712, "path": "/dev/loop712", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 713, "path": "/dev/loop713", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 714, "path": "/dev/loop714", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 715, "path": "/dev/loop715", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 716, "path": "/dev/loop716", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 717, "path": "/dev/loop717", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 718, "path": "/dev/loop718", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 719, "path": "/dev/loop719", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 720, "path": "/dev/loop720", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 721, "path": "/dev/loop721", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 722, "path": "/dev/loop722", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 723, "path": "/dev/loop723", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 724, "path": "/dev/loop724", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 725, "path": "/dev/loop725", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 726, "path": "/dev/loop726", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 727, "path": "/dev/loop727", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 728, "path": "/dev/loop728", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 729, "path": "/dev/loop729", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 730, "path": "/dev/loop730", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 731, "path": "/dev/loop731", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 732, "path": "/dev/loop732", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 733, "path": "/dev/loop733", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 734, "path": "/dev/loop734", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 735, "path": "/dev/loop735", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 736, "path": "/dev/loop736", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 737, "path": "/dev/loop737", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 738, "path": "/dev/loop738", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 739, "path": "/dev/loop739", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 740, "path": "/dev/loop740", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 741, "path": "/dev/loop741", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 742, "path": "/dev/loop742", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 743, "path": "/dev/loop743", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 744, "path": "/dev/loop744", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 745, "path": "/dev/loop745", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 746, "path": "/dev/loop746", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 747, "path": "/dev/loop747", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 748, "path": "/dev/loop748", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 749, "path": "/dev/loop749", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 750, "path": "/dev/loop750", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 751, "path": "/dev/loop751", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 752, "path": "/dev/loop752", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 753, "path": "/dev/loop753", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 754, "path": "/dev/loop754", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 755, "path": "/dev/loop755", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 756, "path": "/dev/loop756", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 757, "path": "/dev/loop757", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 758, "path": "/dev/loop758", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 759, "path": "/dev/loop759", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 760, "path": "/dev/loop760", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 761, "path": "/dev/loop761", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 762, "path": "/dev/loop762", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 763, "path": "/dev/loop763", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 764, "path": "/dev/loop764", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 765, "path": "/dev/loop765", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 766, "path": "/dev/loop766", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 767, "path": "/dev/loop767", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 768, "path": "/dev/loop768", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 769, "path": "/dev/loop769", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 770, "path": "/dev/loop770", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 771, "path": "/dev/loop771", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 772, "path": "/dev/loop772", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 773, "path": "/dev/loop773", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 774, "path": "/dev/loop774", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 775, "path": "/dev/loop775", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 776, "path": "/dev/loop776", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 777, "path": "/dev/loop777", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 778, "path": "/dev/loop778", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 779, "path": "/dev/loop779", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 780, "path": "/dev/loop780", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 781, "path": "/dev/loop781", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 782, "path": "/dev/loop782", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 783, "path": "/dev/loop783", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 784, "path": "/dev/loop784", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 785, "path": "/dev/loop785", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 786, "path": "/dev/loop786", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 787, "path": "/dev/loop787", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 788, "path": "/dev/loop788", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 789, "path": "/dev/loop789", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 790, "path": "/dev/loop790", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 791, "path": "/dev/loop791", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 792, "path": "/dev/loop792", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 793, "path": "/dev/loop793", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 794, "path": "/dev/loop794", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 795, "path": "/dev/loop795", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 796, "path": "/dev/loop796", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 797, "path": "/dev/loop797", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 798, "path": "/dev/loop798", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 799, "path": "/dev/loop799", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 800, "path": "/dev/loop800", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 801, "path": "/dev/loop801", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 802, "path": "/dev/loop802", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 803, "path": "/dev/loop803", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 804, "path": "/dev/loop804", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 805, "path": "/dev/loop805", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 806, "path": "/dev/loop806", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 807, "path": "/dev/loop807", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 808, "path": "/dev/loop808", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 809, "path": "/dev/loop809", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 810, "path": "/dev/loop810", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 811, "path": "/dev/loop811", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 812, "path": "/dev/loop812", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 813, "path": "/dev/loop813", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 814, "path": "/dev/loop814", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 815, "path": "/dev/loop815", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 816, "path": "/dev/loop816", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 817, "path": "/dev/loop817", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 818, "path": "/dev/loop818", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 819, "path": "/dev/loop819", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 820, "path": "/dev/loop820", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 821, "path": "/dev/loop821", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 822, "path": "/dev/loop822", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 823, "path": "/dev/loop823", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 824, "path": "/dev/loop824", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 825, "path": "/dev/loop825", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 826, "path": "/dev/loop826", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 827, "path": "/dev/loop827", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 828, "path": "/dev/loop828", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 829, "path": "/dev/loop829", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 830, "path": "/dev/loop830", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 831, "path": "/dev/loop831", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 832, "path": "/dev/loop832", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 833, "path": "/dev/loop833", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 834, "path": "/dev/loop834", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 835, "path": "/dev/loop835", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 836, "path": "/dev/loop836", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 837, "path": "/dev/loop837", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 838, "path": "/dev/loop838", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 839, "path": "/dev/loop839", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 840, "path": "/dev/loop840", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 841, "path": "/dev/loop841", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 842, "path": "/dev/loop842", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 843, "path": "/dev/loop843", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 844, "path": "/dev/loop844", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 845, "path": "/dev/loop845", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 846, "path": "/dev/loop846", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 847, "path": "/dev/loop847", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 848, "path": "/dev/loop848", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 849, "path": "/dev/loop849", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 850, "path": "/dev/loop850", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 851, "path": "/dev/loop851", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 852, "path": "/dev/loop852", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 853, "path": "/dev/loop853", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 854, "path": "/dev/loop854", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 855, "path": "/dev/loop855", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 856, "path": "/dev/loop856", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 857, "path": "/dev/loop857", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 858, "path": "/dev/loop858", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 859, "path": "/dev/loop859", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 860, "path": "/dev/loop860", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 861, "path": "/dev/loop861", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 862, "path": "/dev/loop862", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 863, "path": "/dev/loop863", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 864, "path": "/dev/loop864", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 865, "path": "/dev/loop865", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 866, "path": "/dev/loop866", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 867, "path": "/dev/loop867", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 868, "path": "/dev/loop868", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 869, "path": "/dev/loop869", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 870, "path": "/dev/loop870", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 871, "path": "/dev/loop871", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 872, "path": "/dev/loop872", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 873, "path": "/dev/loop873", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 874, "path": "/dev/loop874", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 875, "path": "/dev/loop875", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 876, "path": "/dev/loop876", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 877, "path": "/dev/loop877", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 878, "path": "/dev/loop878", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 879, "path": "/dev/loop879", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 880, "path": "/dev/loop880", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 881, "path": "/dev/loop881", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 882, "path": "/dev/loop882", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 883, "path": "/dev/loop883", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 884, "path": "/dev/loop884", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 885, "path": "/dev/loop885", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 886, "path": "/dev/loop886", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 887, "path": "/dev/loop887", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 888, "path": "/dev/loop888", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 889, "path": "/dev/loop889", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 890, "path": "/dev/loop890", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 891, "path": "/dev/loop891", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 892, "path": "/dev/loop892", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 893, "path": "/dev/loop893", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 894, "path": "/dev/loop894", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 895, "path": "/dev/loop895", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 896, "path": "/dev/loop896", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 897, "path": "/dev/loop897", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 898, "path": "/dev/loop898", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 899, "path": "/dev/loop899", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 900, "path": "/dev/loop900", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 901, "path": "/dev/loop901", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 902, "path": "/dev/loop902", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 903, "path": "/dev/loop903", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 904, "path": "/dev/loop904", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 905, "path": "/dev/loop905", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 906, "path": "/dev/loop906", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 907, "path": "/dev/loop907", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 908, "path": "/dev/loop908", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 909, "path": "/dev/loop909", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 910, "path": "/dev/loop910", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 911, "path": "/dev/loop911", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 912, "path": "/dev/loop912", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 913, "path": "/dev/loop913", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 914, "path": "/dev/loop914", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 915, "path": "/dev/loop915", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 916, "path": "/dev/loop916", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 917, "path": "/dev/loop917", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 918, "path": "/dev/loop918", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 919, "path": "/dev/loop919", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 920, "path": "/dev/loop920", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 921, "path": "/dev/loop921", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 922, "path": "/dev/loop922", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 923, "path": "/dev/loop923", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 924, "path": "/dev/loop924", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 925, "path": "/dev/loop925", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 926, "path": "/dev/loop926", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 927, "path": "/dev/loop927", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 928, "path": "/dev/loop928", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 929, "path": "/dev/loop929", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 930, "path": "/dev/loop930", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 931, "path": "/dev/loop931", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 932, "path": "/dev/loop932", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 933, "path": "/dev/loop933", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 934, "path": "/dev/loop934", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 935, "path": "/dev/loop935", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 936, "path": "/dev/loop936", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 937, "path": "/dev/loop937", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 938, "path": "/dev/loop938", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 939, "path": "/dev/loop939", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 940, "path": "/dev/loop940", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 941, "path": "/dev/loop941", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 942, "path": "/dev/loop942", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 943, "path": "/dev/loop943", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 944, "path": "/dev/loop944", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 945, "path": "/dev/loop945", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 946, "path": "/dev/loop946", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 947, "path": "/dev/loop947", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 948, "path": "/dev/loop948", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 949, "path": "/dev/loop949", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 950, "path": "/dev/loop950", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 951, "path": "/dev/loop951", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 952, "path": "/dev/loop952", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 953, "path": "/dev/loop953", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 954, "path": "/dev/loop954", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 955, "path": "/dev/loop955", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 956, "path": "/dev/loop956", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 957, "path": "/dev/loop957", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 958, "path": "/dev/loop958", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 959, "path": "/dev/loop959", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 960, "path": "/dev/loop960", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 961, "path": "/dev/loop961", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 962, "path": "/dev/loop962", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 963, "path": "/dev/loop963", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 964, "path": "/dev/loop964", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 965, "path": "/dev/loop965", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 966, "path": "/dev/loop966", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 967, "path": "/dev/loop967", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 968, "path": "/dev/loop968", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 969, "path": "/dev/loop969", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 970, "path": "/dev/loop970", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 971, "path": "/dev/loop971", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 972, "path": "/dev/loop972", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 973, "path": "/dev/loop973", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 974, "path": "/dev/loop974", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 975, "path": "/dev/loop975", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 976, "path": "/dev/loop976", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 977, "path": "/dev/loop977", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 978, "path": "/dev/loop978", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 979, "path": "/dev/loop979", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 980, "path": "/dev/loop980", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 981, "path": "/dev/loop981", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 982, "path": "/dev/loop982", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 983, "path": "/dev/loop983", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 984, "path": "/dev/loop984", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 985, "path": "/dev/loop985", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 986, "path": "/dev/loop986", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 987, "path": "/dev/loop987", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 988, "path": "/dev/loop988", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 989, "path": "/dev/loop989", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 990, "path": "/dev/loop990", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 991, "path": "/dev/loop991", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 992, "path": "/dev/loop992", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 993, "path": "/dev/loop993", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 994, "path": "/dev/loop994", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 995, "path": "/dev/loop995", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 996, "path": "/dev/loop996", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 997, "path": "/dev/loop997", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 998, "path": "/dev/loop998", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 7, "minor": 999, "path": "/dev/loop999", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "path": "/proc/2601744/ns/pid", "type": "pid" }, { "path": "/proc/2601744/ns/ipc", "type": "ipc" }, { "path": "/proc/2601744/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2601744/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/proc", "options": [ "rbind", "rprivate", "rw" ], "source": "/proc", "type": "bind" }, { "destination": "/host", "options": [ "rbind", "rprivate", "rw" ], "source": "/", "type": "bind" }, { "destination": "/run/systemd/", "options": [ "rbind", "rprivate", "ro" ], "source": "/run/systemd", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/bash", "-c", "CONTAINERD_SOCKET_DIR=$(lsof -U | grep -E \"/containerd\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\nif [ -n \"$CONTAINERD_SOCKET_DIR\" ]; then\n ln -s /host/$CONTAINERD_SOCKET_DIR /run/containerd\nelse\n CRIO_SOCKET_DIR=$(lsof -U | grep -E \"/crio\\.sock\\s\" | awk '{print $9}' | head -n 1 | xargs -r dirname)\n if [ -n \"$CRIO_SOCKET_DIR\" ]; then\n ln -s /host/$CRIO_SOCKET_DIR /var/run/crio\n fi\nfi\nsleep infinity\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker2", "CRI_VERSION=v1.32.0", "RUNC_VERSION=v1.2.6", "NCTL_VERSION=2.0.4", "CTR_VERSION=2.0.4", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "7f97daf9bbac340bd2d6ae3a6a71a2e772deb9289190193d16e141bbfd56fa6f", "snapshotKey": "2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1f010140", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:00:06.808821325Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "2d0dcfbada23f57fb4a64afc4c0387b98aa8d18c9d3161ef60a979a33df14ec4", "image": { "annotations": {}, "image": "docker.io/lfncnti/cluster-tools:v1.0.8", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "labels": { "io.kubernetes.container.name": "cluster-tools", "io.kubernetes.pod.name": "cluster-tools-2gwh4", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "55aab1ee-161d-4716-bd96-2d596290bbb8" }, "logPath": "/var/log/pods/cnf-testsuite_cluster-tools-2gwh4_55aab1ee-161d-4716-bd96-2d596290bbb8/cluster-tools/0.log", "message": "", "metadata": { "attempt": 0, "name": "cluster-tools" }, "mounts": [ { "containerPath": "/run/systemd/", "gidMappings": [], "hostPath": "/run/systemd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/proc", "gidMappings": [], "hostPath": "/proc", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/host", "gidMappings": [], "hostPath": "/", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/volumes/kubernetes.io~projected/kube-api-access-xdb97", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/55aab1ee-161d-4716-bd96-2d596290bbb8/containers/cluster-tools/4ad47f02", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-07-10T12:00:07.20383242Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:32] INFO -- CNTI: node_pid_by_container_id pid: 2601770 [2025-07-10 12:05:32] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:32] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:32] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:32] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:32] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:33] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sleep\u0000infinity\u0000", error: ""} [2025-07-10 12:05:33] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:33] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:33] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:33] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:33] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:33] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601770\nNgid:\t0\nPid:\t2601770\nPPid:\t2601721\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601770\nNSpid:\t2601770\nNSpgid:\t2601770\nNSsid:\t2601770\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 912 kB\nVmRSS:\t 912 kB\nRssAnon:\t 88 kB\nRssFile:\t 824 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t43\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-07-10 12:05:33] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:33] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rbcqd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:33] INFO -- CNTI: node_pid_by_container_id container_id: containerd://434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa [2025-07-10 12:05:33] INFO -- CNTI: parse_container_id container_id: containerd://434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa [2025-07-10 12:05:33] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:33] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:33] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:33] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:33] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:34] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:34Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:34Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:34] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--audit-interval=1\",\n \"--log-level=INFO\",\n \"--constraint-violations-limit=20\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--audit-from-cache=false\",\n \"--audit-chunk-size=500\",\n \"--audit-match-kind-only=false\",\n \"--audit-events-involved-namespace=false\",\n \"--operation=audit\",\n \"--operation=status\",\n \"--operation=generate\",\n \"--operation=mutation-status\",\n \"--logtostderr\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--metrics-backend=prometheus\",\n \"--disable-cert-rotation=false\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-audit-7ccf77cb5b-6vxxn\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-audit-7ccf77cb5b-6vxxn,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-audit-7ccf77cb5b-6vxxn\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"97a3e004-3a38-4756-b4d5-9b7c6d5a9550\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/tmp/audit\",\n \"host_path\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84\"\n }\n ]\n },\n \"pid\": 2603964,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-audit-7ccf77cb5b-6vxxn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"97a3e004-3a38-4756-b4d5-9b7c6d5a9550\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-pod97a3e004_3a38_4756_b4d5_9b7c6d5a9550.slice:cri-containerd:434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603910/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603910/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603910/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/tmp/audit\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--audit-interval=1\",\n \"--log-level=INFO\",\n \"--constraint-violations-limit=20\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--audit-from-cache=false\",\n \"--audit-chunk-size=500\",\n \"--audit-match-kind-only=false\",\n \"--audit-events-involved-namespace=false\",\n \"--operation=audit\",\n \"--operation=status\",\n \"--operation=generate\",\n \"--operation=mutation-status\",\n \"--logtostderr\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--metrics-backend=prometheus\",\n \"--disable-cert-rotation=false\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-audit-7ccf77cb5b-6vxxn\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-audit-7ccf77cb5b-6vxxn\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-audit-7ccf77cb5b-6vxxn,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567\",\n \"snapshotKey\": \"434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-07-10T12:05:11.825710329Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-audit-7ccf77cb5b-6vxxn\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"97a3e004-3a38-4756-b4d5-9b7c6d5a9550\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-audit-7ccf77cb5b-6vxxn_97a3e004-3a38-4756-b4d5-9b7c6d5a9550/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/tmp/audit\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:05:12.035682522Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:34Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:34Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:34] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true" ], "command": [ "/manager" ], "envs": [ { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-audit-7ccf77cb5b-6vxxn" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-audit-7ccf77cb5b-6vxxn,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.139.240" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.139.240:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.139.240:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.139.240" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-audit-7ccf77cb5b-6vxxn", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "97a3e004-3a38-4756-b4d5-9b7c6d5a9550" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/tmp/audit", "host_path": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84" } ] }, "pid": 2603964, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567", "io.kubernetes.cri.sandbox-name": "gatekeeper-audit-7ccf77cb5b-6vxxn", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "97a3e004-3a38-4756-b4d5-9b7c6d5a9550" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-pod97a3e004_3a38_4756_b4d5_9b7c6d5a9550.slice:cri-containerd:434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603910/ns/ipc", "type": "ipc" }, { "path": "/proc/2603910/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603910/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/tmp/audit", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-audit-7ccf77cb5b-6vxxn", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-audit-7ccf77cb5b-6vxxn", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-audit-7ccf77cb5b-6vxxn,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443", "KUBERNETES_PORT_443_TCP_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT=tcp://10.96.0.1:443" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "024eb1fbbb9aeb542e9b98f8ba51c754cea520d165fc6a62d9aac3d54fd29567", "snapshotKey": "434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-07-10T12:05:11.825710329Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-audit-7ccf77cb5b-6vxxn", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "97a3e004-3a38-4756-b4d5-9b7c6d5a9550" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-audit-7ccf77cb5b-6vxxn_97a3e004-3a38-4756-b4d5-9b7c6d5a9550/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/tmp/audit", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~empty-dir/tmp-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/volumes/kubernetes.io~projected/kube-api-access-rbcqd", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/97a3e004-3a38-4756-b4d5-9b7c6d5a9550/containers/manager/e82aef84", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-07-10T12:05:12.035682522Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-07-10 12:05:34] INFO -- CNTI: node_pid_by_container_id pid: 2603964 [2025-07-10 12:05:34] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:34] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--audit-interval=1\u0000--log-level=INFO\u0000--constraint-violations-limit=20\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--audit-from-cache=false\u0000--audit-chunk-size=500\u0000--audit-match-kind-only=false\u0000--audit-events-involved-namespace=false\u0000--operation=audit\u0000--operation=status\u0000--operation=generate\u0000--operation=mutation-status\u0000--logtostderr\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--metrics-backend=prometheus\u0000--disable-cert-rotation=false\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000", error: ""} [2025-07-10 12:05:34] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:34] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603964\nNgid:\t0\nPid:\t2603964\nPPid:\t2603858\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603964\t1\nNSpid:\t2603964\t1\nNSpgid:\t2603964\t1\nNSsid:\t2603964\t1\nVmPeak:\t 1313744 kB\nVmSize:\t 1313744 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 97728 kB\nVmRSS:\t 96376 kB\nRssAnon:\t 45616 kB\nRssFile:\t 50760 kB\nRssShmem:\t 0 kB\nVmData:\t 105300 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 348 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t55\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t680\nnonvoluntary_ctxt_switches:\t19\n", error: ""} [2025-07-10 12:05:34] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:34] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:24:41Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4610648", "uid" => "b377898c-d4a3-429a-a07e-e94ef699bfcf"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:57Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:17aa5b215f2b70bc0e456a87bcdd93e8774f133c73452df69d89606abc555270", "docker.io/library/docker:dind"], "sizeBytes" => 144084273}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.32.5", "registry.k8s.io/kube-apiserver:v1.32.5"], "sizeBytes" => 98089457}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.32.5", "registry.k8s.io/kube-proxy:v1.32.5"], "sizeBytes" => 95322311}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.32.5", "registry.k8s.io/kube-controller-manager:v1.32.5"], "sizeBytes" => 90814807}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.32.5", "registry.k8s.io/kube-scheduler:v1.32.5"], "sizeBytes" => 70670679}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:2a0b297cc7c4cd376ac7413df339ff2fdaa1ec9d099aed92b5ea1f031ef7f639", "registry.k8s.io/sig-storage/csi-resizer:v1.13.1"], "sizeBytes" => 32400950}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:a399393ff5bd156277c56bae0c08389b1a1b95b7fd6ea44a316ce55e0dd559d7", "registry.k8s.io/sig-storage/csi-attacher:v4.8.0"], "sizeBytes" => 32231444}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:d7138bcc3aa5f267403d45ad4292c95397e421ea17a0035888850f424c7de25d", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0"], "sizeBytes" => 14781503}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.5", "kubeletVersion" => "v1.32.5", "machineID" => "1c8518f767534ccbb984eba50ce31326", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "908f18f5-d9b2-4601-92f3-9e4f7f539dda"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-07-10T12:05:11Z", "generateName" => "gatekeeper-audit-7ccf77cb5b-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "audit-controller", "gatekeeper.sh/operation" => "audit", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "7ccf77cb5b", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-audit-7ccf77cb5b-6vxxn", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-audit-7ccf77cb5b", "uid" => "831ee3f0-96fc-443c-9822-9e4f781db839"}], "resourceVersion" => "4610619", "uid" => "97a3e004-3a38-4756-b4d5-9b7c6d5a9550"}, "spec" => {"affinity" => {}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--audit-interval=1", "--log-level=INFO", "--constraint-violations-limit=20", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--audit-from-cache=false", "--audit-chunk-size=500", "--audit-match-kind-only=false", "--audit-events-involved-namespace=false", "--operation=audit", "--operation=status", "--operation=generate", "--operation=mutation-status", "--logtostderr", "--health-addr=:9090", "--prometheus-port=8888", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--metrics-backend=prometheus", "--disable-cert-rotation=false", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rbcqd", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"emptyDir" => {}, "name" => "tmp-volume"}, {"name" => "kube-api-access-rbcqd", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rbcqd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.28", "podIPs" => [{"ip" => "10.244.2.28"}], "qosClass" => "Burstable", "startTime" => "2025-07-10T12:05:11Z"}}, container_status: {"containerID" => "containerd://434353813dfc6036e7c47e641bda492a996d7e123fa8ceba4bef10522cf10daa", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/tmp/audit", "name" => "tmp-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rbcqd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603964\nNgid:\t0\nPid:\t2603964\nPPid:\t2603858\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603964\t1\nNSpid:\t2603964\t1\nNSpgid:\t2603964\t1\nNSsid:\t2603964\t1\nVmPeak:\t 1313744 kB\nVmSize:\t 1313744 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 97728 kB\nVmRSS:\t 96376 kB\nRssAnon:\t 45616 kB\nRssFile:\t 50760 kB\nRssShmem:\t 0 kB\nVmData:\t 105300 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 348 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t55\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t680\nnonvoluntary_ctxt_switches:\t19\n", pid: "2603964", cmdline: "/manager\u0000--audit-interval=1\u0000--log-level=INFO\u0000--constraint-violations-limit=20\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--audit-from-cache=false\u0000--audit-chunk-size=500\u0000--audit-match-kind-only=false\u0000--audit-events-involved-namespace=false\u0000--operation=audit\u0000--operation=status\u0000--operation=generate\u0000--operation=mutation-status\u0000--logtostderr\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--metrics-backend=prometheus\u0000--disable-cert-rotation=false\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000"} [2025-07-10 12:05:34] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-k9db8", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:34] INFO -- CNTI: node_pid_by_container_id container_id: containerd://15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6 [2025-07-10 12:05:34] INFO -- CNTI: parse_container_id container_id: containerd://15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6 [2025-07-10 12:05:34] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:35] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:35Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:35Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:35] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"args\": [\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"command\": [\n \"/manager\"\n ],\n \"envs\": [\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"gatekeeper-controller-manager-7cfb59478c-6kqfs\"\n },\n {\n \"key\": \"NAMESPACE\",\n \"value\": \"cnf-testsuite\"\n },\n {\n \"key\": \"CONTAINER_NAME\",\n \"value\": \"manager\"\n },\n {\n \"key\": \"OTEL_RESOURCE_ATTRIBUTES\",\n \"value\": \"k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-6kqfs,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.139.240\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER\",\n \"value\": \"443\"\n },\n {\n \"key\": \"GATEKEEPER_WEBHOOK_SERVICE_PORT\",\n \"value\": \"tcp://10.96.139.240:443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098\",\n \"user_specified_image\": \"openpolicyagent/gatekeeper:v3.19.2\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-6kqfs\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"18e3da2f-cbe2-4ca4-a172-3e98e0c4674f\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 536870912,\n \"memory_swap_limit_in_bytes\": 536870912,\n \"oom_score_adj\": 993\n },\n \"security_context\": {\n \"capabilities\": {\n \"drop_capabilities\": [\n \"ALL\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"no_new_privs\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"readonly_rootfs\": true,\n \"run_as_group\": {\n \"value\": 999\n },\n \"run_as_user\": {\n \"value\": 1000\n },\n \"seccomp\": {},\n \"supplemental_groups\": [\n 999,\n 999\n ]\n }\n },\n \"log_path\": \"manager/0.log\",\n \"metadata\": {\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/certs\",\n \"host_path\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a\"\n }\n ]\n },\n \"pid\": 2603972,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"manager\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"openpolicyagent/gatekeeper:v3.19.2\",\n \"io.kubernetes.cri.sandbox-id\": \"2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156\",\n \"io.kubernetes.cri.sandbox-name\": \"gatekeeper-controller-manager-7cfb59478c-6kqfs\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-testsuite\",\n \"io.kubernetes.cri.sandbox-uid\": \"18e3da2f-cbe2-4ca4-a172-3e98e0c4674f\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-burstable-pod18e3da2f_cbe2_4ca4_a172_3e98e0c4674f.slice:cri-containerd:15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603917/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603917/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603917/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 536870912,\n \"swap\": 536870912\n }\n },\n \"seccomp\": {\n \"architectures\": [\n \"SCMP_ARCH_X86_64\",\n \"SCMP_ARCH_X86\",\n \"SCMP_ARCH_X32\"\n ],\n \"defaultAction\": \"SCMP_ACT_ERRNO\",\n \"syscalls\": [\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"accept\",\n \"accept4\",\n \"access\",\n \"adjtimex\",\n \"alarm\",\n \"bind\",\n \"brk\",\n \"cachestat\",\n \"capget\",\n \"capset\",\n \"chdir\",\n \"chmod\",\n \"chown\",\n \"chown32\",\n \"clock_adjtime\",\n \"clock_adjtime64\",\n \"clock_getres\",\n \"clock_getres_time64\",\n \"clock_gettime\",\n \"clock_gettime64\",\n \"clock_nanosleep\",\n \"clock_nanosleep_time64\",\n \"close\",\n \"close_range\",\n \"connect\",\n \"copy_file_range\",\n \"creat\",\n \"dup\",\n \"dup2\",\n \"dup3\",\n \"epoll_create\",\n \"epoll_create1\",\n \"epoll_ctl\",\n \"epoll_ctl_old\",\n \"epoll_pwait\",\n \"epoll_pwait2\",\n \"epoll_wait\",\n \"epoll_wait_old\",\n \"eventfd\",\n \"eventfd2\",\n \"execve\",\n \"execveat\",\n \"exit\",\n \"exit_group\",\n \"faccessat\",\n \"faccessat2\",\n \"fadvise64\",\n \"fadvise64_64\",\n \"fallocate\",\n \"fanotify_mark\",\n \"fchdir\",\n \"fchmod\",\n \"fchmodat\",\n \"fchmodat2\",\n \"fchown\",\n \"fchown32\",\n \"fchownat\",\n \"fcntl\",\n \"fcntl64\",\n \"fdatasync\",\n \"fgetxattr\",\n \"flistxattr\",\n \"flock\",\n \"fork\",\n \"fremovexattr\",\n \"fsetxattr\",\n \"fstat\",\n \"fstat64\",\n \"fstatat64\",\n \"fstatfs\",\n \"fstatfs64\",\n \"fsync\",\n \"ftruncate\",\n \"ftruncate64\",\n \"futex\",\n \"futex_requeue\",\n \"futex_time64\",\n \"futex_wait\",\n \"futex_waitv\",\n \"futex_wake\",\n \"futimesat\",\n \"getcpu\",\n \"getcwd\",\n \"getdents\",\n \"getdents64\",\n \"getegid\",\n \"getegid32\",\n \"geteuid\",\n \"geteuid32\",\n \"getgid\",\n \"getgid32\",\n \"getgroups\",\n \"getgroups32\",\n \"getitimer\",\n \"getpeername\",\n \"getpgid\",\n \"getpgrp\",\n \"getpid\",\n \"getppid\",\n \"getpriority\",\n \"getrandom\",\n \"getresgid\",\n \"getresgid32\",\n \"getresuid\",\n \"getresuid32\",\n \"getrlimit\",\n \"get_robust_list\",\n \"getrusage\",\n \"getsid\",\n \"getsockname\",\n \"getsockopt\",\n \"get_thread_area\",\n \"gettid\",\n \"gettimeofday\",\n \"getuid\",\n \"getuid32\",\n \"getxattr\",\n \"inotify_add_watch\",\n \"inotify_init\",\n \"inotify_init1\",\n \"inotify_rm_watch\",\n \"io_cancel\",\n \"ioctl\",\n \"io_destroy\",\n \"io_getevents\",\n \"io_pgetevents\",\n \"io_pgetevents_time64\",\n \"ioprio_get\",\n \"ioprio_set\",\n \"io_setup\",\n \"io_submit\",\n \"ipc\",\n \"kill\",\n \"landlock_add_rule\",\n \"landlock_create_ruleset\",\n \"landlock_restrict_self\",\n \"lchown\",\n \"lchown32\",\n \"lgetxattr\",\n \"link\",\n \"linkat\",\n \"listen\",\n \"listxattr\",\n \"llistxattr\",\n \"_llseek\",\n \"lremovexattr\",\n \"lseek\",\n \"lsetxattr\",\n \"lstat\",\n \"lstat64\",\n \"madvise\",\n \"membarrier\",\n \"memfd_create\",\n \"memfd_secret\",\n \"mincore\",\n \"mkdir\",\n \"mkdirat\",\n \"mknod\",\n \"mknodat\",\n \"mlock\",\n \"mlock2\",\n \"mlockall\",\n \"map_shadow_stack\",\n \"mmap\",\n \"mmap2\",\n \"mprotect\",\n \"mq_getsetattr\",\n \"mq_notify\",\n \"mq_open\",\n \"mq_timedreceive\",\n \"mq_timedreceive_time64\",\n \"mq_timedsend\",\n \"mq_timedsend_time64\",\n \"mq_unlink\",\n \"mremap\",\n \"msgctl\",\n \"msgget\",\n \"msgrcv\",\n \"msgsnd\",\n \"msync\",\n \"munlock\",\n \"munlockall\",\n \"munmap\",\n \"name_to_handle_at\",\n \"nanosleep\",\n \"newfstatat\",\n \"_newselect\",\n \"open\",\n \"openat\",\n \"openat2\",\n \"pause\",\n \"pidfd_open\",\n \"pidfd_send_signal\",\n \"pipe\",\n \"pipe2\",\n \"pkey_alloc\",\n \"pkey_free\",\n \"pkey_mprotect\",\n \"poll\",\n \"ppoll\",\n \"ppoll_time64\",\n \"prctl\",\n \"pread64\",\n \"preadv\",\n \"preadv2\",\n \"prlimit64\",\n \"process_mrelease\",\n \"pselect6\",\n \"pselect6_time64\",\n \"pwrite64\",\n \"pwritev\",\n \"pwritev2\",\n \"read\",\n \"readahead\",\n \"readlink\",\n \"readlinkat\",\n \"readv\",\n \"recv\",\n \"recvfrom\",\n \"recvmmsg\",\n \"recvmmsg_time64\",\n \"recvmsg\",\n \"remap_file_pages\",\n \"removexattr\",\n \"rename\",\n \"renameat\",\n \"renameat2\",\n \"restart_syscall\",\n \"rmdir\",\n \"rseq\",\n \"rt_sigaction\",\n \"rt_sigpending\",\n \"rt_sigprocmask\",\n \"rt_sigqueueinfo\",\n \"rt_sigreturn\",\n \"rt_sigsuspend\",\n \"rt_sigtimedwait\",\n \"rt_sigtimedwait_time64\",\n \"rt_tgsigqueueinfo\",\n \"sched_getaffinity\",\n \"sched_getattr\",\n \"sched_getparam\",\n \"sched_get_priority_max\",\n \"sched_get_priority_min\",\n \"sched_getscheduler\",\n \"sched_rr_get_interval\",\n \"sched_rr_get_interval_time64\",\n \"sched_setaffinity\",\n \"sched_setattr\",\n \"sched_setparam\",\n \"sched_setscheduler\",\n \"sched_yield\",\n \"seccomp\",\n \"select\",\n \"semctl\",\n \"semget\",\n \"semop\",\n \"semtimedop\",\n \"semtimedop_time64\",\n \"send\",\n \"sendfile\",\n \"sendfile64\",\n \"sendmmsg\",\n \"sendmsg\",\n \"sendto\",\n \"setfsgid\",\n \"setfsgid32\",\n \"setfsuid\",\n \"setfsuid32\",\n \"setgid\",\n \"setgid32\",\n \"setgroups\",\n \"setgroups32\",\n \"setitimer\",\n \"setpgid\",\n \"setpriority\",\n \"setregid\",\n \"setregid32\",\n \"setresgid\",\n \"setresgid32\",\n \"setresuid\",\n \"setresuid32\",\n \"setreuid\",\n \"setreuid32\",\n \"setrlimit\",\n \"set_robust_list\",\n \"setsid\",\n \"setsockopt\",\n \"set_thread_area\",\n \"set_tid_address\",\n \"setuid\",\n \"setuid32\",\n \"setxattr\",\n \"shmat\",\n \"shmctl\",\n \"shmdt\",\n \"shmget\",\n \"shutdown\",\n \"sigaltstack\",\n \"signalfd\",\n \"signalfd4\",\n \"sigprocmask\",\n \"sigreturn\",\n \"socketcall\",\n \"socketpair\",\n \"splice\",\n \"stat\",\n \"stat64\",\n \"statfs\",\n \"statfs64\",\n \"statx\",\n \"symlink\",\n \"symlinkat\",\n \"sync\",\n \"sync_file_range\",\n \"syncfs\",\n \"sysinfo\",\n \"tee\",\n \"tgkill\",\n \"time\",\n \"timer_create\",\n \"timer_delete\",\n \"timer_getoverrun\",\n \"timer_gettime\",\n \"timer_gettime64\",\n \"timer_settime\",\n \"timer_settime64\",\n \"timerfd_create\",\n \"timerfd_gettime\",\n \"timerfd_gettime64\",\n \"timerfd_settime\",\n \"timerfd_settime64\",\n \"times\",\n \"tkill\",\n \"truncate\",\n \"truncate64\",\n \"ugetrlimit\",\n \"umask\",\n \"uname\",\n \"unlink\",\n \"unlinkat\",\n \"utime\",\n \"utimensat\",\n \"utimensat_time64\",\n \"utimes\",\n \"vfork\",\n \"vmsplice\",\n \"wait4\",\n \"waitid\",\n \"waitpid\",\n \"write\",\n \"writev\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_NE\",\n \"value\": 40\n }\n ],\n \"names\": [\n \"socket\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 0\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 8\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131072\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 131080\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_EQ\",\n \"value\": 4294967295\n }\n ],\n \"names\": [\n \"personality\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"process_vm_readv\",\n \"process_vm_writev\",\n \"ptrace\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"names\": [\n \"arch_prctl\",\n \"modify_ldt\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ALLOW\",\n \"args\": [\n {\n \"index\": 0,\n \"op\": \"SCMP_CMP_MASKED_EQ\",\n \"value\": 2114060288\n }\n ],\n \"names\": [\n \"clone\"\n ]\n },\n {\n \"action\": \"SCMP_ACT_ERRNO\",\n \"errnoRet\": 38,\n \"names\": [\n \"clone3\"\n ]\n }\n ]\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/certs\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/manager\",\n \"--port=8443\",\n \"--health-addr=:9090\",\n \"--prometheus-port=8888\",\n \"--logtostderr\",\n \"--log-denies=false\",\n \"--admission-events-involved-namespace=false\",\n \"--log-level=INFO\",\n \"--exempt-namespace=cnf-testsuite\",\n \"--operation=webhook\",\n \"--enable-external-data=true\",\n \"--enable-generator-resource-expansion=true\",\n \"--log-mutations=false\",\n \"--mutation-annotations=false\",\n \"--disable-cert-rotation=false\",\n \"--max-serving-threads=-1\",\n \"--tls-min-version=1.3\",\n \"--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\",\n \"--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\",\n \"--external-data-provider-response-cache-ttl=3m\",\n \"--enable-k8s-native-validation=true\",\n \"--metrics-backend=prometheus\",\n \"--operation=mutation-webhook\",\n \"--disable-opa-builtin={http.send}\"\n ],\n \"capabilities\": {},\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=gatekeeper-controller-manager-7cfb59478c-6kqfs\",\n \"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt\",\n \"POD_NAMESPACE=cnf-testsuite\",\n \"POD_NAME=gatekeeper-controller-manager-7cfb59478c-6kqfs\",\n \"NAMESPACE=cnf-testsuite\",\n \"CONTAINER_NAME=manager\",\n \"OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-6kqfs,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443\",\n \"GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\"\n ],\n \"noNewPrivileges\": true,\n \"oomScoreAdj\": 993,\n \"user\": {\n \"additionalGids\": [\n 999\n ],\n \"gid\": 999,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\",\n \"readonly\": true\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156\",\n \"snapshotKey\": \"15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"76209f0f\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"webhook-server\\\",\\\"containerPort\\\":8443,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"metrics\\\",\\\"containerPort\\\":8888,\\\"protocol\\\":\\\"TCP\\\"},{\\\"name\\\":\\\"healthz\\\",\\\"containerPort\\\":9090,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"60\"\n },\n \"createdAt\": \"2025-07-10T12:05:11.835720135Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/openpolicyagent/gatekeeper:v3.19.2\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"manager\",\n \"io.kubernetes.pod.name\": \"gatekeeper-controller-manager-7cfb59478c-6kqfs\",\n \"io.kubernetes.pod.namespace\": \"cnf-testsuite\",\n \"io.kubernetes.pod.uid\": \"18e3da2f-cbe2-4ca4-a172-3e98e0c4674f\"\n },\n \"logPath\": \"/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-6kqfs_18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/manager/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"manager\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/certs\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"536870912\",\n \"memorySwapLimitInBytes\": \"536870912\",\n \"oomScoreAdj\": \"993\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:05:12.038021852Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"999\",\n \"supplementalGroups\": [\n \"999\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:35Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:35Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:35] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "args": [ "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "command": [ "/manager" ], "envs": [ { "key": "POD_NAMESPACE", "value": "cnf-testsuite" }, { "key": "POD_NAME", "value": "gatekeeper-controller-manager-7cfb59478c-6kqfs" }, { "key": "NAMESPACE", "value": "cnf-testsuite" }, { "key": "CONTAINER_NAME", "value": "manager" }, { "key": "OTEL_RESOURCE_ATTRIBUTES", "value": "k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-6kqfs,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST", "value": "10.96.139.240" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR", "value": "10.96.139.240" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP", "value": "tcp://10.96.139.240:443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER", "value": "443" }, { "key": "GATEKEEPER_WEBHOOK_SERVICE_PORT", "value": "tcp://10.96.139.240:443" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" } ], "image": { "image": "sha256:41969c9612ddea70cbc68a351ecb8423a554d7ffb0a5c4284010775aae41d098", "user_specified_image": "openpolicyagent/gatekeeper:v3.19.2" }, "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-6kqfs", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "18e3da2f-cbe2-4ca4-a172-3e98e0c4674f" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 536870912, "memory_swap_limit_in_bytes": 536870912, "oom_score_adj": 993 }, "security_context": { "capabilities": { "drop_capabilities": [ "ALL" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "no_new_privs": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "readonly_rootfs": true, "run_as_group": { "value": 999 }, "run_as_user": { "value": 1000 }, "seccomp": {}, "supplemental_groups": [ 999, 999 ] } }, "log_path": "manager/0.log", "metadata": { "name": "manager" }, "mounts": [ { "container_path": "/certs", "host_path": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a" } ] }, "pid": 2603972, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "manager", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "openpolicyagent/gatekeeper:v3.19.2", "io.kubernetes.cri.sandbox-id": "2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156", "io.kubernetes.cri.sandbox-name": "gatekeeper-controller-manager-7cfb59478c-6kqfs", "io.kubernetes.cri.sandbox-namespace": "cnf-testsuite", "io.kubernetes.cri.sandbox-uid": "18e3da2f-cbe2-4ca4-a172-3e98e0c4674f" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-burstable-pod18e3da2f_cbe2_4ca4_a172_3e98e0c4674f.slice:cri-containerd:15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603917/ns/ipc", "type": "ipc" }, { "path": "/proc/2603917/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603917/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 536870912, "swap": 536870912 } }, "seccomp": { "architectures": [ "SCMP_ARCH_X86_64", "SCMP_ARCH_X86", "SCMP_ARCH_X32" ], "defaultAction": "SCMP_ACT_ERRNO", "syscalls": [ { "action": "SCMP_ACT_ALLOW", "names": [ "accept", "accept4", "access", "adjtimex", "alarm", "bind", "brk", "cachestat", "capget", "capset", "chdir", "chmod", "chown", "chown32", "clock_adjtime", "clock_adjtime64", "clock_getres", "clock_getres_time64", "clock_gettime", "clock_gettime64", "clock_nanosleep", "clock_nanosleep_time64", "close", "close_range", "connect", "copy_file_range", "creat", "dup", "dup2", "dup3", "epoll_create", "epoll_create1", "epoll_ctl", "epoll_ctl_old", "epoll_pwait", "epoll_pwait2", "epoll_wait", "epoll_wait_old", "eventfd", "eventfd2", "execve", "execveat", "exit", "exit_group", "faccessat", "faccessat2", "fadvise64", "fadvise64_64", "fallocate", "fanotify_mark", "fchdir", "fchmod", "fchmodat", "fchmodat2", "fchown", "fchown32", "fchownat", "fcntl", "fcntl64", "fdatasync", "fgetxattr", "flistxattr", "flock", "fork", "fremovexattr", "fsetxattr", "fstat", "fstat64", "fstatat64", "fstatfs", "fstatfs64", "fsync", "ftruncate", "ftruncate64", "futex", "futex_requeue", "futex_time64", "futex_wait", "futex_waitv", "futex_wake", "futimesat", "getcpu", "getcwd", "getdents", "getdents64", "getegid", "getegid32", "geteuid", "geteuid32", "getgid", "getgid32", "getgroups", "getgroups32", "getitimer", "getpeername", "getpgid", "getpgrp", "getpid", "getppid", "getpriority", "getrandom", "getresgid", "getresgid32", "getresuid", "getresuid32", "getrlimit", "get_robust_list", "getrusage", "getsid", "getsockname", "getsockopt", "get_thread_area", "gettid", "gettimeofday", "getuid", "getuid32", "getxattr", "inotify_add_watch", "inotify_init", "inotify_init1", "inotify_rm_watch", "io_cancel", "ioctl", "io_destroy", "io_getevents", "io_pgetevents", "io_pgetevents_time64", "ioprio_get", "ioprio_set", "io_setup", "io_submit", "ipc", "kill", "landlock_add_rule", "landlock_create_ruleset", "landlock_restrict_self", "lchown", "lchown32", "lgetxattr", "link", "linkat", "listen", "listxattr", "llistxattr", "_llseek", "lremovexattr", "lseek", "lsetxattr", "lstat", "lstat64", "madvise", "membarrier", "memfd_create", "memfd_secret", "mincore", "mkdir", "mkdirat", "mknod", "mknodat", "mlock", "mlock2", "mlockall", "map_shadow_stack", "mmap", "mmap2", "mprotect", "mq_getsetattr", "mq_notify", "mq_open", "mq_timedreceive", "mq_timedreceive_time64", "mq_timedsend", "mq_timedsend_time64", "mq_unlink", "mremap", "msgctl", "msgget", "msgrcv", "msgsnd", "msync", "munlock", "munlockall", "munmap", "name_to_handle_at", "nanosleep", "newfstatat", "_newselect", "open", "openat", "openat2", "pause", "pidfd_open", "pidfd_send_signal", "pipe", "pipe2", "pkey_alloc", "pkey_free", "pkey_mprotect", "poll", "ppoll", "ppoll_time64", "prctl", "pread64", "preadv", "preadv2", "prlimit64", "process_mrelease", "pselect6", "pselect6_time64", "pwrite64", "pwritev", "pwritev2", "read", "readahead", "readlink", "readlinkat", "readv", "recv", "recvfrom", "recvmmsg", "recvmmsg_time64", "recvmsg", "remap_file_pages", "removexattr", "rename", "renameat", "renameat2", "restart_syscall", "rmdir", "rseq", "rt_sigaction", "rt_sigpending", "rt_sigprocmask", "rt_sigqueueinfo", "rt_sigreturn", "rt_sigsuspend", "rt_sigtimedwait", "rt_sigtimedwait_time64", "rt_tgsigqueueinfo", "sched_getaffinity", "sched_getattr", "sched_getparam", "sched_get_priority_max", "sched_get_priority_min", "sched_getscheduler", "sched_rr_get_interval", "sched_rr_get_interval_time64", "sched_setaffinity", "sched_setattr", "sched_setparam", "sched_setscheduler", "sched_yield", "seccomp", "select", "semctl", "semget", "semop", "semtimedop", "semtimedop_time64", "send", "sendfile", "sendfile64", "sendmmsg", "sendmsg", "sendto", "setfsgid", "setfsgid32", "setfsuid", "setfsuid32", "setgid", "setgid32", "setgroups", "setgroups32", "setitimer", "setpgid", "setpriority", "setregid", "setregid32", "setresgid", "setresgid32", "setresuid", "setresuid32", "setreuid", "setreuid32", "setrlimit", "set_robust_list", "setsid", "setsockopt", "set_thread_area", "set_tid_address", "setuid", "setuid32", "setxattr", "shmat", "shmctl", "shmdt", "shmget", "shutdown", "sigaltstack", "signalfd", "signalfd4", "sigprocmask", "sigreturn", "socketcall", "socketpair", "splice", "stat", "stat64", "statfs", "statfs64", "statx", "symlink", "symlinkat", "sync", "sync_file_range", "syncfs", "sysinfo", "tee", "tgkill", "time", "timer_create", "timer_delete", "timer_getoverrun", "timer_gettime", "timer_gettime64", "timer_settime", "timer_settime64", "timerfd_create", "timerfd_gettime", "timerfd_gettime64", "timerfd_settime", "timerfd_settime64", "times", "tkill", "truncate", "truncate64", "ugetrlimit", "umask", "uname", "unlink", "unlinkat", "utime", "utimensat", "utimensat_time64", "utimes", "vfork", "vmsplice", "wait4", "waitid", "waitpid", "write", "writev" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_NE", "value": 40 } ], "names": [ "socket" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 0 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 8 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131072 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 131080 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_EQ", "value": 4294967295 } ], "names": [ "personality" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "process_vm_readv", "process_vm_writev", "ptrace" ] }, { "action": "SCMP_ACT_ALLOW", "names": [ "arch_prctl", "modify_ldt" ] }, { "action": "SCMP_ACT_ALLOW", "args": [ { "index": 0, "op": "SCMP_CMP_MASKED_EQ", "value": 2114060288 } ], "names": [ "clone" ] }, { "action": "SCMP_ACT_ERRNO", "errnoRet": 38, "names": [ "clone3" ] } ] } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/certs", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/manager", "--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}" ], "capabilities": {}, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=gatekeeper-controller-manager-7cfb59478c-6kqfs", "SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt", "POD_NAMESPACE=cnf-testsuite", "POD_NAME=gatekeeper-controller-manager-7cfb59478c-6kqfs", "NAMESPACE=cnf-testsuite", "CONTAINER_NAME=manager", "OTEL_RESOURCE_ATTRIBUTES=k8s.pod.name=gatekeeper-controller-manager-7cfb59478c-6kqfs,k8s.namespace.name=cnf-testsuite,k8s.container.name=manager", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_HOST=10.96.139.240", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PROTO=tcp", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_ADDR=10.96.139.240", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP=tcp://10.96.139.240:443", "GATEKEEPER_WEBHOOK_SERVICE_PORT_443_TCP_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "GATEKEEPER_WEBHOOK_SERVICE_SERVICE_PORT_HTTPS_WEBHOOK_SERVER=443", "GATEKEEPER_WEBHOOK_SERVICE_PORT=tcp://10.96.139.240:443", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1" ], "noNewPrivileges": true, "oomScoreAdj": 993, "user": { "additionalGids": [ 999 ], "gid": 999, "uid": 1000 } }, "root": { "path": "rootfs", "readonly": true } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "2c458c3637b403c02f967c2ad9a00b5c5c2c77906648c54cbc68633489986156", "snapshotKey": "15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "76209f0f", "io.kubernetes.container.ports": "[{\"name\":\"webhook-server\",\"containerPort\":8443,\"protocol\":\"TCP\"},{\"name\":\"metrics\",\"containerPort\":8888,\"protocol\":\"TCP\"},{\"name\":\"healthz\",\"containerPort\":9090,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "60" }, "createdAt": "2025-07-10T12:05:11.835720135Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "image": { "annotations": {}, "image": "docker.io/openpolicyagent/gatekeeper:v3.19.2", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "labels": { "io.kubernetes.container.name": "manager", "io.kubernetes.pod.name": "gatekeeper-controller-manager-7cfb59478c-6kqfs", "io.kubernetes.pod.namespace": "cnf-testsuite", "io.kubernetes.pod.uid": "18e3da2f-cbe2-4ca4-a172-3e98e0c4674f" }, "logPath": "/var/log/pods/cnf-testsuite_gatekeeper-controller-manager-7cfb59478c-6kqfs_18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/manager/0.log", "message": "", "metadata": { "attempt": 0, "name": "manager" }, "mounts": [ { "containerPath": "/certs", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~secret/cert", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/volumes/kubernetes.io~projected/kube-api-access-k9db8", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/18e3da2f-cbe2-4ca4-a172-3e98e0c4674f/containers/manager/b2de237a", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "536870912", "memorySwapLimitInBytes": "536870912", "oomScoreAdj": "993", "unified": {} } }, "startedAt": "2025-07-10T12:05:12.038021852Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "999", "supplementalGroups": [ "999" ], "uid": "1000" } } } } [2025-07-10 12:05:35] INFO -- CNTI: node_pid_by_container_id pid: 2603972 [2025-07-10 12:05:35] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:35] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:35] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:35] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:35] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:35] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:35] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000", error: ""} [2025-07-10 12:05:35] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:35] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:35] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:35] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:35] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:35] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:36] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603972\nNgid:\t0\nPid:\t2603972\nPPid:\t2603869\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603972\t1\nNSpid:\t2603972\t1\nNSpgid:\t2603972\t1\nNSsid:\t2603972\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 84332 kB\nVmRSS:\t 84332 kB\nRssAnon:\t 33756 kB\nRssFile:\t 50576 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t703\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-07-10 12:05:36] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:36] INFO -- CNTI-find_matching_processes: status found: {node: {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-06-10T13:24:41Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4610648", "uid" => "b377898c-d4a3-429a-a07e-e94ef699bfcf"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:41Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-07-10T12:05:15Z", "lastTransitionTime" => "2025-06-10T13:24:57Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:906f9b2c15b6f64d83c52bf9efd108b434d311fb548ac20abcfb815981e741b6", "docker.io/lfncnti/cluster-tools:v1.0.8"], "sizeBytes" => 466650686}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:17aa5b215f2b70bc0e456a87bcdd93e8774f133c73452df69d89606abc555270", "docker.io/library/docker:dind"], "sizeBytes" => 144084273}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["registry.k8s.io/kube-apiserver-amd64:v1.32.5", "registry.k8s.io/kube-apiserver:v1.32.5"], "sizeBytes" => 98089457}, {"names" => ["registry.k8s.io/kube-proxy-amd64:v1.32.5", "registry.k8s.io/kube-proxy:v1.32.5"], "sizeBytes" => 95322311}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["registry.k8s.io/kube-controller-manager-amd64:v1.32.5", "registry.k8s.io/kube-controller-manager:v1.32.5"], "sizeBytes" => 90814807}, {"names" => ["registry.k8s.io/kube-scheduler-amd64:v1.32.5", "registry.k8s.io/kube-scheduler:v1.32.5"], "sizeBytes" => 70670679}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:940d47bd80306a9501981fbd0dbbd03a1683001ea31b68264b118798a7414048", "docker.io/openpolicyagent/gatekeeper:v3.19.1"], "sizeBytes" => 46143117}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "docker.io/openpolicyagent/gatekeeper:v3.19.2"], "sizeBytes" => 46027895}, {"names" => ["docker.io/kindest/kindnetd:v20250512-df8de77b"], "sizeBytes" => 44375501}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:2a0b297cc7c4cd376ac7413df339ff2fdaa1ec9d099aed92b5ea1f031ef7f639", "registry.k8s.io/sig-storage/csi-resizer:v1.13.1"], "sizeBytes" => 32400950}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:a399393ff5bd156277c56bae0c08389b1a1b95b7fd6ea44a316ce55e0dd559d7", "registry.k8s.io/sig-storage/csi-attacher:v4.8.0"], "sizeBytes" => 32231444}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20250214-acbabc1a"], "sizeBytes" => 22540870}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:470c1006900856c57c8eb202b21eea57d3716824e36df45b1fb9d5a11150962a", "docker.io/openpolicyagent/gatekeeper-crds:v3.19.2"], "sizeBytes" => 17992119}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["quay.io/coreos/etcd@sha256:f6602cc2b5a2ff2138db48546d727e72599cd14021cdc5309142f407f5d43969", "quay.io/coreos/etcd:v3.2.32"], "sizeBytes" => 16250306}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:d7138bcc3aa5f267403d45ad4292c95397e421ea17a0035888850f424c7de25d", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.13.0"], "sizeBytes" => 14781503}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["docker.io/curlimages/curl@sha256:3dfa70a646c5d03ddf0e7c0ff518a5661e95b8bcbc82079f0fb7453a96eaae35", "docker.io/curlimages/curl:8.12.0"], "sizeBytes" => 10048754}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://2.1.1", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.5", "kubeletVersion" => "v1.32.5", "machineID" => "1c8518f767534ccbb984eba50ce31326", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "908f18f5-d9b2-4601-92f3-9e4f7f539dda"}, "runtimeHandlers" => [{"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "test-handler"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => "runc"}, {"features" => {"recursiveReadOnlyMounts" => true, "userNamespaces" => true}, "name" => ""}]}}, pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-07-10T12:05:11Z", "generateName" => "gatekeeper-controller-manager-7cfb59478c-", "labels" => {"app" => "gatekeeper", "app.kubernetes.io/instance" => "opa-gatekeeper", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "gatekeeper", "app.kubernetes.io/version" => "3.19.2", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "helm.sh/chart" => "gatekeeper-3.19.2", "heritage" => "Helm", "pod-template-hash" => "7cfb59478c", "release" => "opa-gatekeeper"}, "name" => "gatekeeper-controller-manager-7cfb59478c-6kqfs", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "gatekeeper-controller-manager-7cfb59478c", "uid" => "185111cb-7686-4460-be0e-7687301e769e"}], "resourceVersion" => "4610625", "uid" => "18e3da2f-cbe2-4ca4-a172-3e98e0c4674f"}, "spec" => {"affinity" => {"podAntiAffinity" => {"preferredDuringSchedulingIgnoredDuringExecution" => [{"podAffinityTerm" => {"labelSelector" => {"matchExpressions" => [{"key" => "gatekeeper.sh/operation", "operator" => "In", "values" => ["webhook"]}]}, "topologyKey" => "kubernetes.io/hostname"}, "weight" => 100}]}}, "automountServiceAccountToken" => true, "containers" => [{"args" => ["--port=8443", "--health-addr=:9090", "--prometheus-port=8888", "--logtostderr", "--log-denies=false", "--admission-events-involved-namespace=false", "--log-level=INFO", "--exempt-namespace=cnf-testsuite", "--operation=webhook", "--enable-external-data=true", "--enable-generator-resource-expansion=true", "--log-mutations=false", "--mutation-annotations=false", "--disable-cert-rotation=false", "--max-serving-threads=-1", "--tls-min-version=1.3", "--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration", "--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration", "--external-data-provider-response-cache-ttl=3m", "--enable-k8s-native-validation=true", "--metrics-backend=prometheus", "--operation=mutation-webhook", "--disable-opa-builtin={http.send}"], "command" => ["/manager"], "env" => [{"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "CONTAINER_NAME", "value" => "manager"}, {"name" => "OTEL_RESOURCE_ATTRIBUTES", "value" => "k8s.pod.name=$(POD_NAME),k8s.namespace.name=$(NAMESPACE),k8s.container.name=$(CONTAINER_NAME)"}], "image" => "openpolicyagent/gatekeeper:v3.19.2", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/healthz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "name" => "manager", "ports" => [{"containerPort" => 8443, "name" => "webhook-server", "protocol" => "TCP"}, {"containerPort" => 8888, "name" => "metrics", "protocol" => "TCP"}, {"containerPort" => 9090, "name" => "healthz", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 3, "httpGet" => {"path" => "/readyz", "port" => 9090, "scheme" => "HTTP"}, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 1}, "resources" => {"limits" => {"memory" => "512Mi"}, "requests" => {"cpu" => "100m", "memory" => "512Mi"}}, "securityContext" => {"allowPrivilegeEscalation" => false, "capabilities" => {"drop" => ["ALL"]}, "readOnlyRootFilesystem" => true, "runAsGroup" => 999, "runAsNonRoot" => true, "runAsUser" => 1000, "seccompProfile" => {"type" => "RuntimeDefault"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-k9db8", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000000000, "priorityClassName" => "system-cluster-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {"fsGroup" => 999, "supplementalGroups" => [999]}, "serviceAccount" => "gatekeeper-admin", "serviceAccountName" => "gatekeeper-admin", "terminationGracePeriodSeconds" => 60, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "cert", "secret" => {"defaultMode" => 420, "secretName" => "gatekeeper-webhook-server-cert"}}, {"name" => "kube-api-access-k9db8", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:12Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:05:11Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-k9db8", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.29", "podIPs" => [{"ip" => "10.244.2.29"}], "qosClass" => "Burstable", "startTime" => "2025-07-10T12:05:11Z"}}, container_status: {"containerID" => "containerd://15fb3940eac1178c5ff68e31c05299447679a47625ad86c28e7adf71e617f6e6", "image" => "docker.io/openpolicyagent/gatekeeper:v3.19.2", "imageID" => "docker.io/openpolicyagent/gatekeeper@sha256:a634c2c4b7463b3f4f0e1924ba1f0380ac9274adb75affb23649ebceb1bd4cd9", "lastState" => {}, "name" => "manager", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:05:12Z"}}, "volumeMounts" => [{"mountPath" => "/certs", "name" => "cert", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-k9db8", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}, status: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603972\nNgid:\t0\nPid:\t2603972\nPPid:\t2603869\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603972\t1\nNSpid:\t2603972\t1\nNSpgid:\t2603972\t1\nNSsid:\t2603972\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 84332 kB\nVmRSS:\t 84332 kB\nRssAnon:\t 33756 kB\nRssFile:\t 50576 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t703\nnonvoluntary_ctxt_switches:\t9\n", pid: "2603972", cmdline: "/manager\u0000--port=8443\u0000--health-addr=:9090\u0000--prometheus-port=8888\u0000--logtostderr\u0000--log-denies=false\u0000--admission-events-involved-namespace=false\u0000--log-level=INFO\u0000--exempt-namespace=cnf-testsuite\u0000--operation=webhook\u0000--enable-external-data=true\u0000--enable-generator-resource-expansion=true\u0000--log-mutations=false\u0000--mutation-annotations=false\u0000--disable-cert-rotation=false\u0000--max-serving-threads=-1\u0000--tls-min-version=1.3\u0000--validating-webhook-configuration-name=gatekeeper-validating-webhook-configuration\u0000--mutating-webhook-configuration-name=gatekeeper-mutating-webhook-configuration\u0000--external-data-provider-response-cache-ttl=3m\u0000--enable-k8s-native-validation=true\u0000--metrics-backend=prometheus\u0000--operation=mutation-webhook\u0000--disable-opa-builtin={http.send}\u0000"} [2025-07-10 12:05:36] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:25:00Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5jqg2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:36] INFO -- CNTI: node_pid_by_container_id container_id: containerd://424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3 [2025-07-10 12:05:36] INFO -- CNTI: parse_container_id container_id: containerd://424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3 [2025-07-10 12:05:36] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:36] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:36] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:36] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:36] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:36Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:36Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:36] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440\",\n \"user_specified_image\": \"alpine:3.6\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-dsrxz\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"7f190298-4895-4e74-81e9-21b9e111d181\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"loopdev/0.log\",\n \"metadata\": {\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/dev\",\n \"host_path\": \"/dev\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986\"\n }\n ]\n },\n \"pid\": 866,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"loopdev\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"alpine:3.6\",\n \"io.kubernetes.cri.sandbox-id\": \"69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e\",\n \"io.kubernetes.cri.sandbox-name\": \"create-loop-devs-dsrxz\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"7f190298-4895-4e74-81e9-21b9e111d181\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod7f190298_4895_4e74_81e9_21b9e111d181.slice:cri-containerd:424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/835/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/835/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/835/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/dev\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"sh\",\n \"-c\",\n \"while true; do\\n for i in $(seq 0 1000); do\\n if ! [ -e /dev/loop$i ]; then\\n mknod /dev/loop$i c 7 $i\\n fi\\n done\\n sleep 100000000\\ndone\\n\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=create-loop-devs-dsrxz\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 0,\n 1,\n 2,\n 3,\n 4,\n 6,\n 10,\n 11,\n 20,\n 26,\n 27\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e\",\n \"snapshotKey\": \"424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"8713a689\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:25:00.731851064Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/library/alpine:3.6\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"loopdev\",\n \"io.kubernetes.pod.name\": \"create-loop-devs-dsrxz\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"7f190298-4895-4e74-81e9-21b9e111d181\"\n },\n \"logPath\": \"/var/log/pods/kube-system_create-loop-devs-dsrxz_7f190298-4895-4e74-81e9-21b9e111d181/loopdev/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"loopdev\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/dev\",\n \"gidMappings\": [],\n \"hostPath\": \"/dev\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:25:00.903279404Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\",\n \"1\",\n \"2\",\n \"3\",\n \"4\",\n \"6\",\n \"10\",\n \"11\",\n \"20\",\n \"26\",\n \"27\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:36Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:36Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:36] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "envs": [ { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" } ], "image": { "image": "sha256:43773d1dba76c4d537b494a8454558a41729b92aa2ad0feb23521c3e58cd0440", "user_specified_image": "alpine:3.6" }, "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-dsrxz", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "7f190298-4895-4e74-81e9-21b9e111d181" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "loopdev/0.log", "metadata": { "name": "loopdev" }, "mounts": [ { "container_path": "/dev", "host_path": "/dev" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986" } ] }, "pid": 866, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "loopdev", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "alpine:3.6", "io.kubernetes.cri.sandbox-id": "69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e", "io.kubernetes.cri.sandbox-name": "create-loop-devs-dsrxz", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "7f190298-4895-4e74-81e9-21b9e111d181" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod7f190298_4895_4e74_81e9_21b9e111d181.slice:cri-containerd:424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/835/ns/ipc", "type": "ipc" }, { "path": "/proc/835/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/835/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/dev", "options": [ "rbind", "rprivate", "rw" ], "source": "/dev", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=create-loop-devs-dsrxz", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 0, 1, 2, 3, 4, 6, 10, 11, 20, 26, 27 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "69b0f5cda04918294c8b22438d33e0162baf28bc15bd8a9cab9aaca6329ae07e", "snapshotKey": "424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "8713a689", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:25:00.731851064Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "424c60ff1981094e68fd50a69af6ef77ab13ad1d00fd68569e9ecba7c760bff3", "image": { "annotations": {}, "image": "docker.io/library/alpine:3.6", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "labels": { "io.kubernetes.container.name": "loopdev", "io.kubernetes.pod.name": "create-loop-devs-dsrxz", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "7f190298-4895-4e74-81e9-21b9e111d181" }, "logPath": "/var/log/pods/kube-system_create-loop-devs-dsrxz_7f190298-4895-4e74-81e9-21b9e111d181/loopdev/0.log", "message": "", "metadata": { "attempt": 0, "name": "loopdev" }, "mounts": [ { "containerPath": "/dev", "gidMappings": [], "hostPath": "/dev", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/volumes/kubernetes.io~projected/kube-api-access-5jqg2", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/7f190298-4895-4e74-81e9-21b9e111d181/containers/loopdev/fc171986", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-06-10T13:25:00.903279404Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0", "1", "2", "3", "4", "6", "10", "11", "20", "26", "27" ], "uid": "0" } } } } [2025-07-10 12:05:36] INFO -- CNTI: node_pid_by_container_id pid: 866 [2025-07-10 12:05:36] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:36] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:36] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:36] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:36] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "sh\u0000-c\u0000while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n\u0000", error: ""} [2025-07-10 12:05:36] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:36] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:37] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t866\nNgid:\t0\nPid:\t866\nPPid:\t810\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t866\t1\nNSpid:\t866\t1\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t915\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-07-10 12:05:37] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:37] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508", "image" => "docker.io/kindest/kindnetd:v20250512-df8de77b", "imageID" => "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:46Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/nri", "name" => "nri-plugin"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-kfvfz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:37] INFO -- CNTI: node_pid_by_container_id container_id: containerd://48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508 [2025-07-10 12:05:37] INFO -- CNTI: parse_container_id container_id: containerd://48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508 [2025-07-10 12:05:37] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:37] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:37] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:37] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:37Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:37Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:37] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"envs\": [\n {\n \"key\": \"CONTROL_PLANE_ENDPOINT\",\n \"value\": \"v132-control-plane:6443\"\n },\n {\n \"key\": \"HOST_IP\",\n \"value\": \"172.24.0.9\"\n },\n {\n \"key\": \"POD_IP\",\n \"value\": \"172.24.0.9\"\n },\n {\n \"key\": \"POD_SUBNET\",\n \"value\": \"10.244.0.0/16\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"user_specified_image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-brb7q\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"9e7e8a68-d983-4f8f-8a3c-3679813a5ef0\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 52428800,\n \"memory_swap_limit_in_bytes\": 52428800,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"capabilities\": {\n \"add_capabilities\": [\n \"NET_RAW\",\n \"NET_ADMIN\"\n ]\n },\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kindnet-cni/0.log\",\n \"metadata\": {\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/cni/net.d\",\n \"host_path\": \"/etc/cni/net.d\"\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/nri\",\n \"host_path\": \"/var/run/nri\"\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048\"\n }\n ]\n },\n \"pid\": 702,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kindnet-cni\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"io.kubernetes.cri.sandbox-id\": \"b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5\",\n \"io.kubernetes.cri.sandbox-name\": \"kindnet-brb7q\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"9e7e8a68-d983-4f8f-8a3c-3679813a5ef0\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pod9e7e8a68_d983_4f8f_8a3c_3679813a5ef0.slice:cri-containerd:48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/460/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/460/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/460/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 52428800,\n \"swap\": 52428800\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/cni/net.d\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/etc/cni/net.d\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/nri\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/run/nri\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/bin/kindnetd\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_NET_ADMIN\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker2\",\n \"CONTROL_PLANE_ENDPOINT=v132-control-plane:6443\",\n \"HOST_IP=172.24.0.9\",\n \"POD_IP=172.24.0.9\",\n \"POD_SUBNET=10.244.0.0/16\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5\",\n \"snapshotKey\": \"48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"127fdb84\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:45.246103426Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/kindest/kindnetd:v20250512-df8de77b\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kindnet-cni\",\n \"io.kubernetes.pod.name\": \"kindnet-brb7q\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"9e7e8a68-d983-4f8f-8a3c-3679813a5ef0\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kindnet-brb7q_9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/kindnet-cni/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kindnet-cni\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/cni/net.d\",\n \"gidMappings\": [],\n \"hostPath\": \"/etc/cni/net.d\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/nri\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/run/nri\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"52428800\",\n \"memorySwapLimitInBytes\": \"52428800\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:46.695878895Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:37Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:37Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:37] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "envs": [ { "key": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" }, { "key": "HOST_IP", "value": "172.24.0.9" }, { "key": "POD_IP", "value": "172.24.0.9" }, { "key": "POD_SUBNET", "value": "10.244.0.0/16" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" } ], "image": { "image": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "user_specified_image": "docker.io/kindest/kindnetd:v20250512-df8de77b" }, "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-brb7q", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "9e7e8a68-d983-4f8f-8a3c-3679813a5ef0" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 52428800, "memory_swap_limit_in_bytes": 52428800, "oom_score_adj": -997 }, "security_context": { "capabilities": { "add_capabilities": [ "NET_RAW", "NET_ADMIN" ] }, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kindnet-cni/0.log", "metadata": { "name": "kindnet-cni" }, "mounts": [ { "container_path": "/etc/cni/net.d", "host_path": "/etc/cni/net.d" }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/nri", "host_path": "/var/run/nri" }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048" } ] }, "pid": 702, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kindnet-cni", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/kindest/kindnetd:v20250512-df8de77b", "io.kubernetes.cri.sandbox-id": "b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5", "io.kubernetes.cri.sandbox-name": "kindnet-brb7q", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "9e7e8a68-d983-4f8f-8a3c-3679813a5ef0" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pod9e7e8a68_d983_4f8f_8a3c_3679813a5ef0.slice:cri-containerd:48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/460/ns/ipc", "type": "ipc" }, { "path": "/proc/460/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/460/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 52428800, "swap": 52428800 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5/shm", "type": "bind" }, { "destination": "/etc/cni/net.d", "options": [ "rbind", "rprivate", "rw" ], "source": "/etc/cni/net.d", "type": "bind" }, { "destination": "/var/run/nri", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/run/nri", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/bin/kindnetd" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE", "CAP_NET_ADMIN" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker2", "CONTROL_PLANE_ENDPOINT=v132-control-plane:6443", "HOST_IP=172.24.0.9", "POD_IP=172.24.0.9", "POD_SUBNET=10.244.0.0/16", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_PORT_53_UDP_PROTO=udp" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "b70f28b86ebde9abe467e70294c8e14f196a124223dc182de597bc6d23360ac5", "snapshotKey": "48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "127fdb84", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:45.246103426Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "48e0adf9bafc5bc3caeb5e43b94ac1ce0ee1dc61e6a954313e704bbcc2e6b508", "image": { "annotations": {}, "image": "docker.io/kindest/kindnetd:v20250512-df8de77b", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:409467f978b4a30fe717012736557d637f66371452c3b279c02b943b367a141c", "labels": { "io.kubernetes.container.name": "kindnet-cni", "io.kubernetes.pod.name": "kindnet-brb7q", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "9e7e8a68-d983-4f8f-8a3c-3679813a5ef0" }, "logPath": "/var/log/pods/kube-system_kindnet-brb7q_9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/kindnet-cni/0.log", "message": "", "metadata": { "attempt": 0, "name": "kindnet-cni" }, "mounts": [ { "containerPath": "/etc/cni/net.d", "gidMappings": [], "hostPath": "/etc/cni/net.d", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/nri", "gidMappings": [], "hostPath": "/var/run/nri", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/volumes/kubernetes.io~projected/kube-api-access-kfvfz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/9e7e8a68-d983-4f8f-8a3c-3679813a5ef0/containers/kindnet-cni/2f14e048", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "52428800", "memorySwapLimitInBytes": "52428800", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:46.695878895Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:37] INFO -- CNTI: node_pid_by_container_id pid: 702 [2025-07-10 12:05:37] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:37] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:37] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:38] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/bin/kindnetd\u0000", error: ""} [2025-07-10 12:05:38] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:38] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:38] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:38] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:38] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:38] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t702\nNgid:\t1270145\nPid:\t702\nPPid:\t402\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t702\t1\nNSpid:\t702\t1\nNSpgid:\t702\t1\nNSsid:\t702\t1\nVmPeak:\t 1285704 kB\nVmSize:\t 1285704 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 48900 kB\nVmRSS:\t 26680 kB\nRssAnon:\t 14540 kB\nRssFile:\t 12140 kB\nRssShmem:\t 0 kB\nVmData:\t 64144 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 268 kB\nVmSwap:\t 4 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t233248\nnonvoluntary_ctxt_switches:\t7100\n", error: ""} [2025-07-10 12:05:38] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:38] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.5", "imageID" => "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-06-10T13:24:44Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-hwxmv", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:38] INFO -- CNTI: node_pid_by_container_id container_id: containerd://4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e [2025-07-10 12:05:38] INFO -- CNTI: parse_container_id container_id: containerd://4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e [2025-07-10 12:05:38] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:38] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:38] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:38] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:38] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:39] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:39Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:39Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:39] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"d694c602\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"command\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v132-worker2\"\n ],\n \"envs\": [\n {\n \"key\": \"NODE_NAME\",\n \"value\": \"v132-worker2\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP\",\n \"value\": \"tcp://10.96.0.10:9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_PORT\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_METRICS\",\n \"value\": \"9153\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_9153_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBE_DNS_PORT\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_HOST\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS_TCP\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.0.10\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBE_DNS_SERVICE_PORT_DNS\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBE_DNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.0.10:53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\",\n \"user_specified_image\": \"registry.k8s.io/kube-proxy:v1.32.5\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-qwd9g\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1d807b5e-b228-4490-8496-542366a3b2d9\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"network\": 2,\n \"pid\": 1\n },\n \"privileged\": true,\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"kube-proxy/0.log\",\n \"metadata\": {\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/lib/kube-proxy\",\n \"host_path\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/run/xtables.lock\",\n \"host_path\": \"/run/xtables.lock\"\n },\n {\n \"container_path\": \"/lib/modules\",\n \"host_path\": \"/lib/modules\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39\"\n }\n ]\n },\n \"pid\": 515,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"kube-proxy\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"registry.k8s.io/kube-proxy:v1.32.5\",\n \"io.kubernetes.cri.sandbox-id\": \"646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085\",\n \"io.kubernetes.cri.sandbox-name\": \"kube-proxy-qwd9g\",\n \"io.kubernetes.cri.sandbox-namespace\": \"kube-system\",\n \"io.kubernetes.cri.sandbox-uid\": \"1d807b5e-b228-4490-8496-542366a3b2d9\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod1d807b5e_b228_4490_8496_542366a3b2d9.slice:cri-containerd:4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e\",\n \"devices\": [\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 235,\n \"path\": \"/dev/autofs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 243,\n \"minor\": 0,\n \"path\": \"/dev/bsg/4:0:0:0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 234,\n \"path\": \"/dev/btrfs-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 0,\n \"path\": \"/dev/bus/usb/001/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 1,\n \"path\": \"/dev/bus/usb/001/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 128,\n \"path\": \"/dev/bus/usb/002/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 129,\n \"path\": \"/dev/bus/usb/002/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 256,\n \"path\": \"/dev/bus/usb/003/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 257,\n \"path\": \"/dev/bus/usb/003/002\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 0,\n \"major\": 189,\n \"minor\": 384,\n \"path\": \"/dev/bus/usb/004/001\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 0,\n \"path\": \"/dev/cpu/0/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 1,\n \"path\": \"/dev/cpu/1/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 10,\n \"path\": \"/dev/cpu/10/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 11,\n \"path\": \"/dev/cpu/11/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 12,\n \"path\": \"/dev/cpu/12/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 13,\n \"path\": \"/dev/cpu/13/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 14,\n \"path\": \"/dev/cpu/14/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 15,\n \"path\": \"/dev/cpu/15/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 16,\n \"path\": \"/dev/cpu/16/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 17,\n \"path\": \"/dev/cpu/17/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 18,\n \"path\": \"/dev/cpu/18/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 19,\n \"path\": \"/dev/cpu/19/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 2,\n \"path\": \"/dev/cpu/2/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 20,\n \"path\": \"/dev/cpu/20/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 21,\n \"path\": \"/dev/cpu/21/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 22,\n \"path\": \"/dev/cpu/22/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 23,\n \"path\": \"/dev/cpu/23/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 24,\n \"path\": \"/dev/cpu/24/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 25,\n \"path\": \"/dev/cpu/25/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 26,\n \"path\": \"/dev/cpu/26/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 27,\n \"path\": \"/dev/cpu/27/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 28,\n \"path\": \"/dev/cpu/28/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 29,\n \"path\": \"/dev/cpu/29/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 3,\n \"path\": \"/dev/cpu/3/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 30,\n \"path\": \"/dev/cpu/30/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 31,\n \"path\": \"/dev/cpu/31/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 32,\n \"path\": \"/dev/cpu/32/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 33,\n \"path\": \"/dev/cpu/33/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 34,\n \"path\": \"/dev/cpu/34/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 35,\n \"path\": \"/dev/cpu/35/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 36,\n \"path\": \"/dev/cpu/36/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 37,\n \"path\": \"/dev/cpu/37/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 38,\n \"path\": \"/dev/cpu/38/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 39,\n \"path\": \"/dev/cpu/39/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 4,\n \"path\": \"/dev/cpu/4/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 40,\n \"path\": \"/dev/cpu/40/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 41,\n \"path\": \"/dev/cpu/41/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 42,\n \"path\": \"/dev/cpu/42/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 43,\n \"path\": \"/dev/cpu/43/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 44,\n \"path\": \"/dev/cpu/44/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 45,\n \"path\": \"/dev/cpu/45/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 46,\n \"path\": \"/dev/cpu/46/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 47,\n \"path\": \"/dev/cpu/47/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 48,\n \"path\": \"/dev/cpu/48/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 49,\n \"path\": \"/dev/cpu/49/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 5,\n \"path\": \"/dev/cpu/5/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 50,\n \"path\": \"/dev/cpu/50/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 51,\n \"path\": \"/dev/cpu/51/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 52,\n \"path\": \"/dev/cpu/52/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 53,\n \"path\": \"/dev/cpu/53/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 54,\n \"path\": \"/dev/cpu/54/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 55,\n \"path\": \"/dev/cpu/55/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 56,\n \"path\": \"/dev/cpu/56/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 57,\n \"path\": \"/dev/cpu/57/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 58,\n \"path\": \"/dev/cpu/58/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 59,\n \"path\": \"/dev/cpu/59/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 6,\n \"path\": \"/dev/cpu/6/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 60,\n \"path\": \"/dev/cpu/60/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 61,\n \"path\": \"/dev/cpu/61/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 62,\n \"path\": \"/dev/cpu/62/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 63,\n \"path\": \"/dev/cpu/63/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 64,\n \"path\": \"/dev/cpu/64/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 65,\n \"path\": \"/dev/cpu/65/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 66,\n \"path\": \"/dev/cpu/66/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 67,\n \"path\": \"/dev/cpu/67/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 68,\n \"path\": \"/dev/cpu/68/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 69,\n \"path\": \"/dev/cpu/69/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 7,\n \"path\": \"/dev/cpu/7/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 70,\n \"path\": \"/dev/cpu/70/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 71,\n \"path\": \"/dev/cpu/71/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 72,\n \"path\": \"/dev/cpu/72/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 73,\n \"path\": \"/dev/cpu/73/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 74,\n \"path\": \"/dev/cpu/74/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 75,\n \"path\": \"/dev/cpu/75/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 76,\n \"path\": \"/dev/cpu/76/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 77,\n \"path\": \"/dev/cpu/77/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 78,\n \"path\": \"/dev/cpu/78/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 79,\n \"path\": \"/dev/cpu/79/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 8,\n \"path\": \"/dev/cpu/8/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 80,\n \"path\": \"/dev/cpu/80/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 81,\n \"path\": \"/dev/cpu/81/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 82,\n \"path\": \"/dev/cpu/82/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 83,\n \"path\": \"/dev/cpu/83/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 84,\n \"path\": \"/dev/cpu/84/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 85,\n \"path\": \"/dev/cpu/85/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 86,\n \"path\": \"/dev/cpu/86/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 87,\n \"path\": \"/dev/cpu/87/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 203,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/cpuid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 202,\n \"minor\": 9,\n \"path\": \"/dev/cpu/9/msr\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 184,\n \"path\": \"/dev/cpu/microcode\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 124,\n \"path\": \"/dev/cpu_dma_latency\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 203,\n \"path\": \"/dev/cuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 0,\n \"path\": \"/dev/dm-0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 253,\n \"minor\": 1,\n \"path\": \"/dev/dm-1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 249,\n \"minor\": 0,\n \"path\": \"/dev/dma_heap/system\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 226,\n \"minor\": 0,\n \"path\": \"/dev/dri/card0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 126,\n \"path\": \"/dev/ecryptfs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 0,\n \"path\": \"/dev/falco0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 1,\n \"path\": \"/dev/falco1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 10,\n \"path\": \"/dev/falco10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 11,\n \"path\": \"/dev/falco11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 12,\n \"path\": \"/dev/falco12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 13,\n \"path\": \"/dev/falco13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 14,\n \"path\": \"/dev/falco14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 15,\n \"path\": \"/dev/falco15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 16,\n \"path\": \"/dev/falco16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 17,\n \"path\": \"/dev/falco17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 18,\n \"path\": \"/dev/falco18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 19,\n \"path\": \"/dev/falco19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 2,\n \"path\": \"/dev/falco2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 20,\n \"path\": \"/dev/falco20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 21,\n \"path\": \"/dev/falco21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 22,\n \"path\": \"/dev/falco22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 23,\n \"path\": \"/dev/falco23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 24,\n \"path\": \"/dev/falco24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 25,\n \"path\": \"/dev/falco25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 26,\n \"path\": \"/dev/falco26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 27,\n \"path\": \"/dev/falco27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 28,\n \"path\": \"/dev/falco28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 29,\n \"path\": \"/dev/falco29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 3,\n \"path\": \"/dev/falco3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 30,\n \"path\": \"/dev/falco30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 31,\n \"path\": \"/dev/falco31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 32,\n \"path\": \"/dev/falco32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 33,\n \"path\": \"/dev/falco33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 34,\n \"path\": \"/dev/falco34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 35,\n \"path\": \"/dev/falco35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 36,\n \"path\": \"/dev/falco36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 37,\n \"path\": \"/dev/falco37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 38,\n \"path\": \"/dev/falco38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 39,\n \"path\": \"/dev/falco39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 4,\n \"path\": \"/dev/falco4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 40,\n \"path\": \"/dev/falco40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 41,\n \"path\": \"/dev/falco41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 42,\n \"path\": \"/dev/falco42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 43,\n \"path\": \"/dev/falco43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 44,\n \"path\": \"/dev/falco44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 45,\n \"path\": \"/dev/falco45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 46,\n \"path\": \"/dev/falco46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 47,\n \"path\": \"/dev/falco47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 48,\n \"path\": \"/dev/falco48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 49,\n \"path\": \"/dev/falco49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 5,\n \"path\": \"/dev/falco5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 50,\n \"path\": \"/dev/falco50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 51,\n \"path\": \"/dev/falco51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 52,\n \"path\": \"/dev/falco52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 53,\n \"path\": \"/dev/falco53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 54,\n \"path\": \"/dev/falco54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 55,\n \"path\": \"/dev/falco55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 56,\n \"path\": \"/dev/falco56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 57,\n \"path\": \"/dev/falco57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 58,\n \"path\": \"/dev/falco58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 59,\n \"path\": \"/dev/falco59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 6,\n \"path\": \"/dev/falco6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 60,\n \"path\": \"/dev/falco60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 61,\n \"path\": \"/dev/falco61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 62,\n \"path\": \"/dev/falco62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 63,\n \"path\": \"/dev/falco63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 64,\n \"path\": \"/dev/falco64\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 65,\n \"path\": \"/dev/falco65\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 66,\n \"path\": \"/dev/falco66\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 67,\n \"path\": \"/dev/falco67\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 68,\n \"path\": \"/dev/falco68\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 69,\n \"path\": \"/dev/falco69\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 7,\n \"path\": \"/dev/falco7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 70,\n \"path\": \"/dev/falco70\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 71,\n \"path\": \"/dev/falco71\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 72,\n \"path\": \"/dev/falco72\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 73,\n \"path\": \"/dev/falco73\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 74,\n \"path\": \"/dev/falco74\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 75,\n \"path\": \"/dev/falco75\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 76,\n \"path\": \"/dev/falco76\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 77,\n \"path\": \"/dev/falco77\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 78,\n \"path\": \"/dev/falco78\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 79,\n \"path\": \"/dev/falco79\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 8,\n \"path\": \"/dev/falco8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 80,\n \"path\": \"/dev/falco80\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 81,\n \"path\": \"/dev/falco81\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 82,\n \"path\": \"/dev/falco82\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 83,\n \"path\": \"/dev/falco83\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 84,\n \"path\": \"/dev/falco84\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 85,\n \"path\": \"/dev/falco85\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 86,\n \"path\": \"/dev/falco86\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 87,\n \"path\": \"/dev/falco87\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 256,\n \"gid\": 0,\n \"major\": 235,\n \"minor\": 9,\n \"path\": \"/dev/falco9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 44,\n \"major\": 29,\n \"minor\": 0,\n \"path\": \"/dev/fb0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 7,\n \"path\": \"/dev/full\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 229,\n \"path\": \"/dev/fuse\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 0,\n \"path\": \"/dev/hidraw0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 237,\n \"minor\": 1,\n \"path\": \"/dev/hidraw1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 228,\n \"path\": \"/dev/hpet\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 183,\n \"path\": \"/dev/hwrng\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 0,\n \"path\": \"/dev/i2c-0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 1,\n \"path\": \"/dev/i2c-1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 2,\n \"path\": \"/dev/i2c-2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 3,\n \"path\": \"/dev/i2c-3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 89,\n \"minor\": 4,\n \"path\": \"/dev/i2c-4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 123,\n \"path\": \"/dev/infiniband/rdma_cm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 64,\n \"path\": \"/dev/input/event0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 65,\n \"path\": \"/dev/input/event1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 66,\n \"path\": \"/dev/input/event2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 63,\n \"path\": \"/dev/input/mice\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 106,\n \"major\": 13,\n \"minor\": 32,\n \"path\": \"/dev/input/mouse0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 511,\n \"minor\": 0,\n \"path\": \"/dev/ipmi0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 420,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 11,\n \"path\": \"/dev/kmsg\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 232,\n \"path\": \"/dev/kvm\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 10,\n \"minor\": 237,\n \"path\": \"/dev/loop-control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/loop0\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/loop1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 10,\n \"path\": \"/dev/loop10\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 100,\n \"path\": \"/dev/loop100\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 101,\n \"path\": \"/dev/loop101\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 102,\n \"path\": \"/dev/loop102\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 103,\n \"path\": \"/dev/loop103\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 104,\n \"path\": \"/dev/loop104\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 105,\n \"path\": \"/dev/loop105\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 106,\n \"path\": \"/dev/loop106\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 107,\n \"path\": \"/dev/loop107\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 108,\n \"path\": \"/dev/loop108\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 109,\n \"path\": \"/dev/loop109\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 11,\n \"path\": \"/dev/loop11\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 110,\n \"path\": \"/dev/loop110\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 111,\n \"path\": \"/dev/loop111\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 112,\n \"path\": \"/dev/loop112\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 113,\n \"path\": \"/dev/loop113\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 114,\n \"path\": \"/dev/loop114\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 115,\n \"path\": \"/dev/loop115\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 116,\n \"path\": \"/dev/loop116\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 117,\n \"path\": \"/dev/loop117\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 118,\n \"path\": \"/dev/loop118\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 119,\n \"path\": \"/dev/loop119\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 12,\n \"path\": \"/dev/loop12\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 120,\n \"path\": \"/dev/loop120\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 121,\n \"path\": \"/dev/loop121\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 122,\n \"path\": \"/dev/loop122\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 123,\n \"path\": \"/dev/loop123\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 124,\n \"path\": \"/dev/loop124\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 125,\n \"path\": \"/dev/loop125\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 126,\n \"path\": \"/dev/loop126\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 127,\n \"path\": \"/dev/loop127\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 13,\n \"path\": \"/dev/loop13\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 14,\n \"path\": \"/dev/loop14\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 15,\n \"path\": \"/dev/loop15\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 16,\n \"path\": \"/dev/loop16\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 17,\n \"path\": \"/dev/loop17\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 18,\n \"path\": \"/dev/loop18\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 19,\n \"path\": \"/dev/loop19\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/loop2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 20,\n \"path\": \"/dev/loop20\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 21,\n \"path\": \"/dev/loop21\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 22,\n \"path\": \"/dev/loop22\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 23,\n \"path\": \"/dev/loop23\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 24,\n \"path\": \"/dev/loop24\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 25,\n \"path\": \"/dev/loop25\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 26,\n \"path\": \"/dev/loop26\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 27,\n \"path\": \"/dev/loop27\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 28,\n \"path\": \"/dev/loop28\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 29,\n \"path\": \"/dev/loop29\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/loop3\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 30,\n \"path\": \"/dev/loop30\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 31,\n \"path\": \"/dev/loop31\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 32,\n \"path\": \"/dev/loop32\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 33,\n \"path\": \"/dev/loop33\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 34,\n \"path\": \"/dev/loop34\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 35,\n \"path\": \"/dev/loop35\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 36,\n \"path\": \"/dev/loop36\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 37,\n \"path\": \"/dev/loop37\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 38,\n \"path\": \"/dev/loop38\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 39,\n \"path\": \"/dev/loop39\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/loop4\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 40,\n \"path\": \"/dev/loop40\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 41,\n \"path\": \"/dev/loop41\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 42,\n \"path\": \"/dev/loop42\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 43,\n \"path\": \"/dev/loop43\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 44,\n \"path\": \"/dev/loop44\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 45,\n \"path\": \"/dev/loop45\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 46,\n \"path\": \"/dev/loop46\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 47,\n \"path\": \"/dev/loop47\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 48,\n \"path\": \"/dev/loop48\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 49,\n \"path\": \"/dev/loop49\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/loop5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 50,\n \"path\": \"/dev/loop50\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 51,\n \"path\": \"/dev/loop51\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 52,\n \"path\": \"/dev/loop52\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 53,\n \"path\": \"/dev/loop53\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 54,\n \"path\": \"/dev/loop54\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 55,\n \"path\": \"/dev/loop55\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 56,\n \"path\": \"/dev/loop56\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 57,\n \"path\": \"/dev/loop57\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 58,\n \"path\": \"/dev/loop58\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 59,\n \"path\": \"/dev/loop59\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/loop6\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 60,\n \"path\": \"/dev/loop60\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 61,\n \"path\": \"/dev/loop61\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 62,\n \"path\": \"/dev/loop62\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 63,\n \"path\": \"/dev/loop63\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/loop64\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/loop65\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/loop66\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/loop67\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/loop68\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/loop69\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 7,\n \"path\": \"/dev/loop7\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/loop70\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 71,\n \"path\": \"/dev/loop71\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 72,\n \"path\": \"/dev/loop72\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 73,\n \"path\": \"/dev/loop73\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 74,\n \"path\": \"/dev/loop74\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 75,\n \"path\": \"/dev/loop75\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 76,\n \"path\": \"/dev/loop76\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 77,\n \"path\": \"/dev/loop77\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 78,\n \"path\": \"/dev/loop78\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 79,\n \"path\": \"/dev/loop79\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 8,\n \"path\": \"/dev/loop8\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 80,\n \"path\": \"/dev/loop80\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 81,\n \"path\": \"/dev/loop81\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 82,\n \"path\": \"/dev/loop82\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 83,\n \"path\": \"/dev/loop83\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 84,\n \"path\": \"/dev/loop84\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 85,\n \"path\": \"/dev/loop85\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 86,\n \"path\": \"/dev/loop86\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 87,\n \"path\": \"/dev/loop87\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 88,\n \"path\": \"/dev/loop88\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 89,\n \"path\": \"/dev/loop89\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 9,\n \"path\": \"/dev/loop9\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 90,\n \"path\": \"/dev/loop90\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 91,\n \"path\": \"/dev/loop91\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 92,\n \"path\": \"/dev/loop92\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 93,\n \"path\": \"/dev/loop93\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 94,\n \"path\": \"/dev/loop94\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 95,\n \"path\": \"/dev/loop95\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 96,\n \"path\": \"/dev/loop96\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 97,\n \"path\": \"/dev/loop97\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 98,\n \"path\": \"/dev/loop98\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 7,\n \"minor\": 99,\n \"path\": \"/dev/loop99\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 236,\n \"path\": \"/dev/mapper/control\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 227,\n \"path\": \"/dev/mcelog\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 1,\n \"path\": \"/dev/mem\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 200,\n \"path\": \"/dev/net/tun\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 3,\n \"path\": \"/dev/null\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 144,\n \"path\": \"/dev/nvram\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 416,\n \"gid\": 15,\n \"major\": 1,\n \"minor\": 4,\n \"path\": \"/dev/port\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 108,\n \"minor\": 0,\n \"path\": \"/dev/ppp\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 247,\n \"minor\": 0,\n \"path\": \"/dev/pps0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 1,\n \"path\": \"/dev/psaux\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 0,\n \"path\": \"/dev/ptp0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 1,\n \"path\": \"/dev/ptp1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 246,\n \"minor\": 2,\n \"path\": \"/dev/ptp2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 8,\n \"path\": \"/dev/random\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 436,\n \"gid\": 109,\n \"major\": 10,\n \"minor\": 242,\n \"path\": \"/dev/rfkill\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 248,\n \"minor\": 0,\n \"path\": \"/dev/rtc0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 0,\n \"path\": \"/dev/sda\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 1,\n \"path\": \"/dev/sda1\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 2,\n \"path\": \"/dev/sda2\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 8,\n \"minor\": 5,\n \"path\": \"/dev/sda5\",\n \"type\": \"b\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 6,\n \"major\": 21,\n \"minor\": 0,\n \"path\": \"/dev/sg0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 231,\n \"path\": \"/dev/snapshot\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 1,\n \"path\": \"/dev/snd/seq\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 29,\n \"major\": 116,\n \"minor\": 33,\n \"path\": \"/dev/snd/timer\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 5,\n \"major\": 5,\n \"minor\": 0,\n \"path\": \"/dev/tty\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 0,\n \"path\": \"/dev/tty0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 1,\n \"path\": \"/dev/tty1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 10,\n \"path\": \"/dev/tty10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 11,\n \"path\": \"/dev/tty11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 12,\n \"path\": \"/dev/tty12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 13,\n \"path\": \"/dev/tty13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 14,\n \"path\": \"/dev/tty14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 15,\n \"path\": \"/dev/tty15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 16,\n \"path\": \"/dev/tty16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 17,\n \"path\": \"/dev/tty17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 18,\n \"path\": \"/dev/tty18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 19,\n \"path\": \"/dev/tty19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 2,\n \"path\": \"/dev/tty2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 20,\n \"path\": \"/dev/tty20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 21,\n \"path\": \"/dev/tty21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 22,\n \"path\": \"/dev/tty22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 23,\n \"path\": \"/dev/tty23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 24,\n \"path\": \"/dev/tty24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 25,\n \"path\": \"/dev/tty25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 26,\n \"path\": \"/dev/tty26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 27,\n \"path\": \"/dev/tty27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 28,\n \"path\": \"/dev/tty28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 29,\n \"path\": \"/dev/tty29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 3,\n \"path\": \"/dev/tty3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 30,\n \"path\": \"/dev/tty30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 31,\n \"path\": \"/dev/tty31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 32,\n \"path\": \"/dev/tty32\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 33,\n \"path\": \"/dev/tty33\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 34,\n \"path\": \"/dev/tty34\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 35,\n \"path\": \"/dev/tty35\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 36,\n \"path\": \"/dev/tty36\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 37,\n \"path\": \"/dev/tty37\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 38,\n \"path\": \"/dev/tty38\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 39,\n \"path\": \"/dev/tty39\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 4,\n \"path\": \"/dev/tty4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 40,\n \"path\": \"/dev/tty40\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 41,\n \"path\": \"/dev/tty41\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 42,\n \"path\": \"/dev/tty42\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 43,\n \"path\": \"/dev/tty43\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 44,\n \"path\": \"/dev/tty44\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 45,\n \"path\": \"/dev/tty45\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 46,\n \"path\": \"/dev/tty46\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 47,\n \"path\": \"/dev/tty47\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 48,\n \"path\": \"/dev/tty48\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 49,\n \"path\": \"/dev/tty49\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 5,\n \"path\": \"/dev/tty5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 50,\n \"path\": \"/dev/tty50\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 51,\n \"path\": \"/dev/tty51\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 52,\n \"path\": \"/dev/tty52\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 53,\n \"path\": \"/dev/tty53\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 54,\n \"path\": \"/dev/tty54\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 55,\n \"path\": \"/dev/tty55\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 56,\n \"path\": \"/dev/tty56\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 57,\n \"path\": \"/dev/tty57\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 58,\n \"path\": \"/dev/tty58\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 59,\n \"path\": \"/dev/tty59\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 6,\n \"path\": \"/dev/tty6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 60,\n \"path\": \"/dev/tty60\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 61,\n \"path\": \"/dev/tty61\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 62,\n \"path\": \"/dev/tty62\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 63,\n \"path\": \"/dev/tty63\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 7,\n \"path\": \"/dev/tty7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 8,\n \"path\": \"/dev/tty8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 9,\n \"path\": \"/dev/tty9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 400,\n \"gid\": 5,\n \"major\": 4,\n \"minor\": 64,\n \"path\": \"/dev/ttyS0\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 65,\n \"path\": \"/dev/ttyS1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 74,\n \"path\": \"/dev/ttyS10\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 75,\n \"path\": \"/dev/ttyS11\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 76,\n \"path\": \"/dev/ttyS12\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 77,\n \"path\": \"/dev/ttyS13\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 78,\n \"path\": \"/dev/ttyS14\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 79,\n \"path\": \"/dev/ttyS15\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 80,\n \"path\": \"/dev/ttyS16\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 81,\n \"path\": \"/dev/ttyS17\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 82,\n \"path\": \"/dev/ttyS18\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 83,\n \"path\": \"/dev/ttyS19\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 66,\n \"path\": \"/dev/ttyS2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 84,\n \"path\": \"/dev/ttyS20\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 85,\n \"path\": \"/dev/ttyS21\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 86,\n \"path\": \"/dev/ttyS22\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 87,\n \"path\": \"/dev/ttyS23\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 88,\n \"path\": \"/dev/ttyS24\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 89,\n \"path\": \"/dev/ttyS25\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 90,\n \"path\": \"/dev/ttyS26\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 91,\n \"path\": \"/dev/ttyS27\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 92,\n \"path\": \"/dev/ttyS28\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 93,\n \"path\": \"/dev/ttyS29\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 67,\n \"path\": \"/dev/ttyS3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 94,\n \"path\": \"/dev/ttyS30\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 95,\n \"path\": \"/dev/ttyS31\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 68,\n \"path\": \"/dev/ttyS4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 69,\n \"path\": \"/dev/ttyS5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 70,\n \"path\": \"/dev/ttyS6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 71,\n \"path\": \"/dev/ttyS7\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 72,\n \"path\": \"/dev/ttyS8\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 20,\n \"major\": 4,\n \"minor\": 73,\n \"path\": \"/dev/ttyS9\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 5,\n \"minor\": 3,\n \"path\": \"/dev/ttyprintk\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 121,\n \"major\": 10,\n \"minor\": 125,\n \"path\": \"/dev/udmabuf\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 239,\n \"path\": \"/dev/uhid\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 223,\n \"path\": \"/dev/uinput\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 9,\n \"path\": \"/dev/urandom\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 240,\n \"path\": \"/dev/userio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 0,\n \"path\": \"/dev/vcs\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 1,\n \"path\": \"/dev/vcs1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 2,\n \"path\": \"/dev/vcs2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 3,\n \"path\": \"/dev/vcs3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 4,\n \"path\": \"/dev/vcs4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 5,\n \"path\": \"/dev/vcs5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 6,\n \"path\": \"/dev/vcs6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 128,\n \"path\": \"/dev/vcsa\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 129,\n \"path\": \"/dev/vcsa1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 130,\n \"path\": \"/dev/vcsa2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 131,\n \"path\": \"/dev/vcsa3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 132,\n \"path\": \"/dev/vcsa4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 133,\n \"path\": \"/dev/vcsa5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 134,\n \"path\": \"/dev/vcsa6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 64,\n \"path\": \"/dev/vcsu\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 65,\n \"path\": \"/dev/vcsu1\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 66,\n \"path\": \"/dev/vcsu2\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 67,\n \"path\": \"/dev/vcsu3\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 68,\n \"path\": \"/dev/vcsu4\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 69,\n \"path\": \"/dev/vcsu5\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 5,\n \"major\": 7,\n \"minor\": 70,\n \"path\": \"/dev/vcsu6\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 196,\n \"path\": \"/dev/vfio/vfio\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 127,\n \"path\": \"/dev/vga_arbiter\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 137,\n \"path\": \"/dev/vhci\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 238,\n \"path\": \"/dev/vhost-net\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 432,\n \"gid\": 103,\n \"major\": 10,\n \"minor\": 241,\n \"path\": \"/dev/vhost-vsock\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 438,\n \"gid\": 0,\n \"major\": 1,\n \"minor\": 5,\n \"path\": \"/dev/zero\",\n \"type\": \"c\",\n \"uid\": 0\n },\n {\n \"fileMode\": 384,\n \"gid\": 0,\n \"major\": 10,\n \"minor\": 249,\n \"path\": \"/dev/zfs\",\n \"type\": \"c\",\n \"uid\": 0\n }\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/453/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/453/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/453/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": true\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"rw\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"rw\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/run/xtables.lock\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/xtables.lock\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/lib/modules\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/lib/modules\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/lib/kube-proxy\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/usr/local/bin/kube-proxy\",\n \"--config=/var/lib/kube-proxy/config.conf\",\n \"--hostname-override=v132-worker2\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_DAC_READ_SEARCH\",\n \"CAP_FOWNER\",\n \"CAP_FSETID\",\n \"CAP_KILL\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETPCAP\",\n \"CAP_LINUX_IMMUTABLE\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_NET_BROADCAST\",\n \"CAP_NET_ADMIN\",\n \"CAP_NET_RAW\",\n \"CAP_IPC_LOCK\",\n \"CAP_IPC_OWNER\",\n \"CAP_SYS_MODULE\",\n \"CAP_SYS_RAWIO\",\n \"CAP_SYS_CHROOT\",\n \"CAP_SYS_PTRACE\",\n \"CAP_SYS_PACCT\",\n \"CAP_SYS_ADMIN\",\n \"CAP_SYS_BOOT\",\n \"CAP_SYS_NICE\",\n \"CAP_SYS_RESOURCE\",\n \"CAP_SYS_TIME\",\n \"CAP_SYS_TTY_CONFIG\",\n \"CAP_MKNOD\",\n \"CAP_LEASE\",\n \"CAP_AUDIT_WRITE\",\n \"CAP_AUDIT_CONTROL\",\n \"CAP_SETFCAP\",\n \"CAP_MAC_OVERRIDE\",\n \"CAP_MAC_ADMIN\",\n \"CAP_SYSLOG\",\n \"CAP_WAKE_ALARM\",\n \"CAP_BLOCK_SUSPEND\",\n \"CAP_AUDIT_READ\",\n \"CAP_PERFMON\",\n \"CAP_BPF\",\n \"CAP_CHECKPOINT_RESTORE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=v132-worker2\",\n \"NODE_NAME=v132-worker2\",\n \"KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153\",\n \"KUBE_DNS_PORT_9153_TCP_PROTO=tcp\",\n \"KUBE_DNS_PORT_9153_TCP_PORT=9153\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT=53\",\n \"KUBE_DNS_SERVICE_PORT_METRICS=9153\",\n \"KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_UDP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_PORT=53\",\n \"KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBE_DNS_PORT=udp://10.96.0.10:53\",\n \"KUBE_DNS_PORT_53_UDP_PROTO=udp\",\n \"KUBE_DNS_SERVICE_HOST=10.96.0.10\",\n \"KUBE_DNS_SERVICE_PORT_DNS_TCP=53\",\n \"KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10\",\n \"KUBE_DNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBE_DNS_SERVICE_PORT_DNS=53\",\n \"KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085\",\n \"snapshotKey\": \"4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"d694c602\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-06-10T13:24:44.328610526Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"registry.k8s.io/kube-proxy-amd64:v1.32.5\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"kube-proxy\",\n \"io.kubernetes.pod.name\": \"kube-proxy-qwd9g\",\n \"io.kubernetes.pod.namespace\": \"kube-system\",\n \"io.kubernetes.pod.uid\": \"1d807b5e-b228-4490-8496-542366a3b2d9\"\n },\n \"logPath\": \"/var/log/pods/kube-system_kube-proxy-qwd9g_1d807b5e-b228-4490-8496-542366a3b2d9/kube-proxy/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"kube-proxy\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/lib/kube-proxy\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/run/xtables.lock\",\n \"gidMappings\": [],\n \"hostPath\": \"/run/xtables.lock\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/lib/modules\",\n \"gidMappings\": [],\n \"hostPath\": \"/lib/modules\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-06-10T13:24:44.61595435Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:39Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:39Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:39] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "d694c602", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v132-worker2" ], "envs": [ { "key": "NODE_NAME", "value": "v132-worker2" }, { "key": "KUBE_DNS_PORT_53_TCP", "value": "tcp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_9153_TCP", "value": "tcp://10.96.0.10:9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_PORT_9153_TCP_PORT", "value": "9153" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT", "value": "53" }, { "key": "KUBE_DNS_SERVICE_PORT_METRICS", "value": "9153" }, { "key": "KUBE_DNS_PORT_9153_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBE_DNS_PORT_53_TCP_ADDR", "value": "10.96.0.10" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBE_DNS_PORT", "value": "udp://10.96.0.10:53" }, { "key": "KUBE_DNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "KUBE_DNS_SERVICE_HOST", "value": "10.96.0.10" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS_TCP", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP_ADDR", "value": "10.96.0.10" }, { "key": "KUBE_DNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBE_DNS_SERVICE_PORT_DNS", "value": "53" }, { "key": "KUBE_DNS_PORT_53_UDP", "value": "udp://10.96.0.10:53" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" } ], "image": { "image": "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "user_specified_image": "registry.k8s.io/kube-proxy:v1.32.5" }, "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-qwd9g", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1d807b5e-b228-4490-8496-542366a3b2d9" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "network": 2, "pid": 1 }, "privileged": true, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "kube-proxy/0.log", "metadata": { "name": "kube-proxy" }, "mounts": [ { "container_path": "/var/lib/kube-proxy", "host_path": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy", "readonly": true }, { "container_path": "/run/xtables.lock", "host_path": "/run/xtables.lock" }, { "container_path": "/lib/modules", "host_path": "/lib/modules", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39" } ] }, "pid": 515, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "kube-proxy", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "registry.k8s.io/kube-proxy:v1.32.5", "io.kubernetes.cri.sandbox-id": "646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085", "io.kubernetes.cri.sandbox-name": "kube-proxy-qwd9g", "io.kubernetes.cri.sandbox-namespace": "kube-system", "io.kubernetes.cri.sandbox-uid": "1d807b5e-b228-4490-8496-542366a3b2d9" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod1d807b5e_b228_4490_8496_542366a3b2d9.slice:cri-containerd:4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e", "devices": [ { "fileMode": 384, "gid": 0, "major": 10, "minor": 235, "path": "/dev/autofs", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 243, "minor": 0, "path": "/dev/bsg/4:0:0:0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 6, "major": 10, "minor": 234, "path": "/dev/btrfs-control", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 0, "path": "/dev/bus/usb/001/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 1, "path": "/dev/bus/usb/001/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 128, "path": "/dev/bus/usb/002/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 129, "path": "/dev/bus/usb/002/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 256, "path": "/dev/bus/usb/003/001", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 257, "path": "/dev/bus/usb/003/002", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 0, "major": 189, "minor": 384, "path": "/dev/bus/usb/004/001", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 0, "path": "/dev/cpu/0/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 0, "path": "/dev/cpu/0/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 1, "path": "/dev/cpu/1/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 1, "path": "/dev/cpu/1/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 10, "path": "/dev/cpu/10/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 10, "path": "/dev/cpu/10/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 11, "path": "/dev/cpu/11/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 11, "path": "/dev/cpu/11/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 12, "path": "/dev/cpu/12/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 12, "path": "/dev/cpu/12/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 13, "path": "/dev/cpu/13/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 13, "path": "/dev/cpu/13/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 14, "path": "/dev/cpu/14/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 14, "path": "/dev/cpu/14/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 15, "path": "/dev/cpu/15/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 15, "path": "/dev/cpu/15/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 16, "path": "/dev/cpu/16/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 16, "path": "/dev/cpu/16/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 17, "path": "/dev/cpu/17/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 17, "path": "/dev/cpu/17/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 18, "path": "/dev/cpu/18/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 18, "path": "/dev/cpu/18/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 19, "path": "/dev/cpu/19/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 19, "path": "/dev/cpu/19/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 2, "path": "/dev/cpu/2/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 2, "path": "/dev/cpu/2/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 20, "path": "/dev/cpu/20/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 20, "path": "/dev/cpu/20/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 21, "path": "/dev/cpu/21/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 21, "path": "/dev/cpu/21/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 22, "path": "/dev/cpu/22/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 22, "path": "/dev/cpu/22/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 23, "path": "/dev/cpu/23/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 23, "path": "/dev/cpu/23/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 24, "path": "/dev/cpu/24/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 24, "path": "/dev/cpu/24/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 25, "path": "/dev/cpu/25/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 25, "path": "/dev/cpu/25/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 26, "path": "/dev/cpu/26/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 26, "path": "/dev/cpu/26/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 27, "path": "/dev/cpu/27/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 27, "path": "/dev/cpu/27/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 28, "path": "/dev/cpu/28/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 28, "path": "/dev/cpu/28/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 29, "path": "/dev/cpu/29/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 29, "path": "/dev/cpu/29/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 3, "path": "/dev/cpu/3/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 3, "path": "/dev/cpu/3/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 30, "path": "/dev/cpu/30/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 30, "path": "/dev/cpu/30/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 31, "path": "/dev/cpu/31/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 31, "path": "/dev/cpu/31/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 32, "path": "/dev/cpu/32/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 32, "path": "/dev/cpu/32/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 33, "path": "/dev/cpu/33/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 33, "path": "/dev/cpu/33/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 34, "path": "/dev/cpu/34/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 34, "path": "/dev/cpu/34/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 35, "path": "/dev/cpu/35/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 35, "path": "/dev/cpu/35/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 36, "path": "/dev/cpu/36/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 36, "path": "/dev/cpu/36/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 37, "path": "/dev/cpu/37/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 37, "path": "/dev/cpu/37/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 38, "path": "/dev/cpu/38/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 38, "path": "/dev/cpu/38/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 39, "path": "/dev/cpu/39/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 39, "path": "/dev/cpu/39/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 4, "path": "/dev/cpu/4/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 4, "path": "/dev/cpu/4/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 40, "path": "/dev/cpu/40/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 40, "path": "/dev/cpu/40/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 41, "path": "/dev/cpu/41/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 41, "path": "/dev/cpu/41/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 42, "path": "/dev/cpu/42/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 42, "path": "/dev/cpu/42/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 43, "path": "/dev/cpu/43/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 43, "path": "/dev/cpu/43/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 44, "path": "/dev/cpu/44/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 44, "path": "/dev/cpu/44/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 45, "path": "/dev/cpu/45/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 45, "path": "/dev/cpu/45/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 46, "path": "/dev/cpu/46/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 46, "path": "/dev/cpu/46/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 47, "path": "/dev/cpu/47/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 47, "path": "/dev/cpu/47/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 48, "path": "/dev/cpu/48/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 48, "path": "/dev/cpu/48/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 49, "path": "/dev/cpu/49/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 49, "path": "/dev/cpu/49/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 5, "path": "/dev/cpu/5/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 5, "path": "/dev/cpu/5/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 50, "path": "/dev/cpu/50/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 50, "path": "/dev/cpu/50/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 51, "path": "/dev/cpu/51/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 51, "path": "/dev/cpu/51/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 52, "path": "/dev/cpu/52/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 52, "path": "/dev/cpu/52/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 53, "path": "/dev/cpu/53/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 53, "path": "/dev/cpu/53/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 54, "path": "/dev/cpu/54/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 54, "path": "/dev/cpu/54/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 55, "path": "/dev/cpu/55/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 55, "path": "/dev/cpu/55/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 56, "path": "/dev/cpu/56/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 56, "path": "/dev/cpu/56/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 57, "path": "/dev/cpu/57/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 57, "path": "/dev/cpu/57/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 58, "path": "/dev/cpu/58/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 58, "path": "/dev/cpu/58/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 59, "path": "/dev/cpu/59/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 59, "path": "/dev/cpu/59/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 6, "path": "/dev/cpu/6/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 6, "path": "/dev/cpu/6/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 60, "path": "/dev/cpu/60/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 60, "path": "/dev/cpu/60/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 61, "path": "/dev/cpu/61/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 61, "path": "/dev/cpu/61/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 62, "path": "/dev/cpu/62/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 62, "path": "/dev/cpu/62/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 63, "path": "/dev/cpu/63/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 63, "path": "/dev/cpu/63/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 64, "path": "/dev/cpu/64/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 64, "path": "/dev/cpu/64/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 65, "path": "/dev/cpu/65/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 65, "path": "/dev/cpu/65/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 66, "path": "/dev/cpu/66/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 66, "path": "/dev/cpu/66/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 67, "path": "/dev/cpu/67/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 67, "path": "/dev/cpu/67/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 68, "path": "/dev/cpu/68/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 68, "path": "/dev/cpu/68/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 69, "path": "/dev/cpu/69/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 69, "path": "/dev/cpu/69/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 7, "path": "/dev/cpu/7/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 7, "path": "/dev/cpu/7/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 70, "path": "/dev/cpu/70/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 70, "path": "/dev/cpu/70/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 71, "path": "/dev/cpu/71/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 71, "path": "/dev/cpu/71/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 72, "path": "/dev/cpu/72/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 72, "path": "/dev/cpu/72/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 73, "path": "/dev/cpu/73/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 73, "path": "/dev/cpu/73/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 74, "path": "/dev/cpu/74/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 74, "path": "/dev/cpu/74/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 75, "path": "/dev/cpu/75/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 75, "path": "/dev/cpu/75/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 76, "path": "/dev/cpu/76/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 76, "path": "/dev/cpu/76/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 77, "path": "/dev/cpu/77/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 77, "path": "/dev/cpu/77/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 78, "path": "/dev/cpu/78/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 78, "path": "/dev/cpu/78/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 79, "path": "/dev/cpu/79/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 79, "path": "/dev/cpu/79/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 8, "path": "/dev/cpu/8/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 8, "path": "/dev/cpu/8/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 80, "path": "/dev/cpu/80/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 80, "path": "/dev/cpu/80/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 81, "path": "/dev/cpu/81/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 81, "path": "/dev/cpu/81/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 82, "path": "/dev/cpu/82/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 82, "path": "/dev/cpu/82/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 83, "path": "/dev/cpu/83/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 83, "path": "/dev/cpu/83/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 84, "path": "/dev/cpu/84/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 84, "path": "/dev/cpu/84/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 85, "path": "/dev/cpu/85/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 85, "path": "/dev/cpu/85/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 86, "path": "/dev/cpu/86/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 86, "path": "/dev/cpu/86/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 87, "path": "/dev/cpu/87/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 87, "path": "/dev/cpu/87/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 203, "minor": 9, "path": "/dev/cpu/9/cpuid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 202, "minor": 9, "path": "/dev/cpu/9/msr", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 184, "path": "/dev/cpu/microcode", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 124, "path": "/dev/cpu_dma_latency", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 203, "path": "/dev/cuse", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 0, "path": "/dev/dm-0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 253, "minor": 1, "path": "/dev/dm-1", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 249, "minor": 0, "path": "/dev/dma_heap/system", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 226, "minor": 0, "path": "/dev/dri/card0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 126, "path": "/dev/ecryptfs", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 0, "path": "/dev/falco0", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 1, "path": "/dev/falco1", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 10, "path": "/dev/falco10", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 11, "path": "/dev/falco11", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 12, "path": "/dev/falco12", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 13, "path": "/dev/falco13", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 14, "path": "/dev/falco14", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 15, "path": "/dev/falco15", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 16, "path": "/dev/falco16", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 17, "path": "/dev/falco17", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 18, "path": "/dev/falco18", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 19, "path": "/dev/falco19", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 2, "path": "/dev/falco2", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 20, "path": "/dev/falco20", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 21, "path": "/dev/falco21", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 22, "path": "/dev/falco22", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 23, "path": "/dev/falco23", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 24, "path": "/dev/falco24", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 25, "path": "/dev/falco25", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 26, "path": "/dev/falco26", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 27, "path": "/dev/falco27", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 28, "path": "/dev/falco28", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 29, "path": "/dev/falco29", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 3, "path": "/dev/falco3", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 30, "path": "/dev/falco30", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 31, "path": "/dev/falco31", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 32, "path": "/dev/falco32", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 33, "path": "/dev/falco33", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 34, "path": "/dev/falco34", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 35, "path": "/dev/falco35", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 36, "path": "/dev/falco36", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 37, "path": "/dev/falco37", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 38, "path": "/dev/falco38", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 39, "path": "/dev/falco39", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 4, "path": "/dev/falco4", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 40, "path": "/dev/falco40", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 41, "path": "/dev/falco41", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 42, "path": "/dev/falco42", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 43, "path": "/dev/falco43", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 44, "path": "/dev/falco44", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 45, "path": "/dev/falco45", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 46, "path": "/dev/falco46", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 47, "path": "/dev/falco47", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 48, "path": "/dev/falco48", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 49, "path": "/dev/falco49", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 5, "path": "/dev/falco5", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 50, "path": "/dev/falco50", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 51, "path": "/dev/falco51", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 52, "path": "/dev/falco52", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 53, "path": "/dev/falco53", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 54, "path": "/dev/falco54", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 55, "path": "/dev/falco55", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 56, "path": "/dev/falco56", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 57, "path": "/dev/falco57", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 58, "path": "/dev/falco58", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 59, "path": "/dev/falco59", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 6, "path": "/dev/falco6", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 60, "path": "/dev/falco60", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 61, "path": "/dev/falco61", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 62, "path": "/dev/falco62", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 63, "path": "/dev/falco63", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 64, "path": "/dev/falco64", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 65, "path": "/dev/falco65", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 66, "path": "/dev/falco66", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 67, "path": "/dev/falco67", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 68, "path": "/dev/falco68", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 69, "path": "/dev/falco69", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 7, "path": "/dev/falco7", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 70, "path": "/dev/falco70", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 71, "path": "/dev/falco71", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 72, "path": "/dev/falco72", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 73, "path": "/dev/falco73", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 74, "path": "/dev/falco74", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 75, "path": "/dev/falco75", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 76, "path": "/dev/falco76", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 77, "path": "/dev/falco77", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 78, "path": "/dev/falco78", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 79, "path": "/dev/falco79", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 8, "path": "/dev/falco8", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 80, "path": "/dev/falco80", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 81, "path": "/dev/falco81", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 82, "path": "/dev/falco82", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 83, "path": "/dev/falco83", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 84, "path": "/dev/falco84", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 85, "path": "/dev/falco85", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 86, "path": "/dev/falco86", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 87, "path": "/dev/falco87", "type": "c", "uid": 0 }, { "fileMode": 256, "gid": 0, "major": 235, "minor": 9, "path": "/dev/falco9", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 44, "major": 29, "minor": 0, "path": "/dev/fb0", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 7, "path": "/dev/full", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 229, "path": "/dev/fuse", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 0, "path": "/dev/hidraw0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 237, "minor": 1, "path": "/dev/hidraw1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 228, "path": "/dev/hpet", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 183, "path": "/dev/hwrng", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 0, "path": "/dev/i2c-0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 1, "path": "/dev/i2c-1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 2, "path": "/dev/i2c-2", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 3, "path": "/dev/i2c-3", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 89, "minor": 4, "path": "/dev/i2c-4", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 123, "path": "/dev/infiniband/rdma_cm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 64, "path": "/dev/input/event0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 65, "path": "/dev/input/event1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 66, "path": "/dev/input/event2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 63, "path": "/dev/input/mice", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 106, "major": 13, "minor": 32, "path": "/dev/input/mouse0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 511, "minor": 0, "path": "/dev/ipmi0", "type": "c", "uid": 0 }, { "fileMode": 420, "gid": 0, "major": 1, "minor": 11, "path": "/dev/kmsg", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 232, "path": "/dev/kvm", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 10, "minor": 237, "path": "/dev/loop-control", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 0, "path": "/dev/loop0", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 1, "path": "/dev/loop1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 10, "path": "/dev/loop10", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 100, "path": "/dev/loop100", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 101, "path": "/dev/loop101", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 102, "path": "/dev/loop102", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 103, "path": "/dev/loop103", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 104, "path": "/dev/loop104", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 105, "path": "/dev/loop105", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 106, "path": "/dev/loop106", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 107, "path": "/dev/loop107", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 108, "path": "/dev/loop108", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 109, "path": "/dev/loop109", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 11, "path": "/dev/loop11", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 110, "path": "/dev/loop110", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 111, "path": "/dev/loop111", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 112, "path": "/dev/loop112", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 113, "path": "/dev/loop113", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 114, "path": "/dev/loop114", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 115, "path": "/dev/loop115", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 116, "path": "/dev/loop116", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 117, "path": "/dev/loop117", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 118, "path": "/dev/loop118", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 119, "path": "/dev/loop119", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 12, "path": "/dev/loop12", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 120, "path": "/dev/loop120", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 121, "path": "/dev/loop121", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 122, "path": "/dev/loop122", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 123, "path": "/dev/loop123", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 124, "path": "/dev/loop124", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 125, "path": "/dev/loop125", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 126, "path": "/dev/loop126", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 127, "path": "/dev/loop127", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 13, "path": "/dev/loop13", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 14, "path": "/dev/loop14", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 15, "path": "/dev/loop15", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 16, "path": "/dev/loop16", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 17, "path": "/dev/loop17", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 18, "path": "/dev/loop18", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 19, "path": "/dev/loop19", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 2, "path": "/dev/loop2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 20, "path": "/dev/loop20", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 21, "path": "/dev/loop21", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 22, "path": "/dev/loop22", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 23, "path": "/dev/loop23", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 24, "path": "/dev/loop24", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 25, "path": "/dev/loop25", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 26, "path": "/dev/loop26", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 27, "path": "/dev/loop27", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 28, "path": "/dev/loop28", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 29, "path": "/dev/loop29", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 3, "path": "/dev/loop3", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 30, "path": "/dev/loop30", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 31, "path": "/dev/loop31", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 32, "path": "/dev/loop32", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 33, "path": "/dev/loop33", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 34, "path": "/dev/loop34", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 35, "path": "/dev/loop35", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 36, "path": "/dev/loop36", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 37, "path": "/dev/loop37", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 38, "path": "/dev/loop38", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 39, "path": "/dev/loop39", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 4, "path": "/dev/loop4", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 40, "path": "/dev/loop40", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 41, "path": "/dev/loop41", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 42, "path": "/dev/loop42", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 43, "path": "/dev/loop43", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 44, "path": "/dev/loop44", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 45, "path": "/dev/loop45", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 46, "path": "/dev/loop46", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 47, "path": "/dev/loop47", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 48, "path": "/dev/loop48", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 49, "path": "/dev/loop49", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 5, "path": "/dev/loop5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 50, "path": "/dev/loop50", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 51, "path": "/dev/loop51", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 52, "path": "/dev/loop52", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 53, "path": "/dev/loop53", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 54, "path": "/dev/loop54", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 55, "path": "/dev/loop55", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 56, "path": "/dev/loop56", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 57, "path": "/dev/loop57", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 58, "path": "/dev/loop58", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 59, "path": "/dev/loop59", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 6, "path": "/dev/loop6", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 60, "path": "/dev/loop60", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 61, "path": "/dev/loop61", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 62, "path": "/dev/loop62", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 63, "path": "/dev/loop63", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 64, "path": "/dev/loop64", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 65, "path": "/dev/loop65", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 66, "path": "/dev/loop66", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 67, "path": "/dev/loop67", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 68, "path": "/dev/loop68", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 69, "path": "/dev/loop69", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 7, "path": "/dev/loop7", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 70, "path": "/dev/loop70", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 71, "path": "/dev/loop71", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 72, "path": "/dev/loop72", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 73, "path": "/dev/loop73", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 74, "path": "/dev/loop74", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 75, "path": "/dev/loop75", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 76, "path": "/dev/loop76", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 77, "path": "/dev/loop77", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 78, "path": "/dev/loop78", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 79, "path": "/dev/loop79", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 8, "path": "/dev/loop8", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 80, "path": "/dev/loop80", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 81, "path": "/dev/loop81", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 82, "path": "/dev/loop82", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 83, "path": "/dev/loop83", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 84, "path": "/dev/loop84", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 85, "path": "/dev/loop85", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 86, "path": "/dev/loop86", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 87, "path": "/dev/loop87", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 88, "path": "/dev/loop88", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 89, "path": "/dev/loop89", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 9, "path": "/dev/loop9", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 90, "path": "/dev/loop90", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 91, "path": "/dev/loop91", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 92, "path": "/dev/loop92", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 93, "path": "/dev/loop93", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 94, "path": "/dev/loop94", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 95, "path": "/dev/loop95", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 96, "path": "/dev/loop96", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 97, "path": "/dev/loop97", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 98, "path": "/dev/loop98", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 7, "minor": 99, "path": "/dev/loop99", "type": "b", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 236, "path": "/dev/mapper/control", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 227, "path": "/dev/mcelog", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 1, "path": "/dev/mem", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 200, "path": "/dev/net/tun", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 3, "path": "/dev/null", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 144, "path": "/dev/nvram", "type": "c", "uid": 0 }, { "fileMode": 416, "gid": 15, "major": 1, "minor": 4, "path": "/dev/port", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 108, "minor": 0, "path": "/dev/ppp", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 247, "minor": 0, "path": "/dev/pps0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 1, "path": "/dev/psaux", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 0, "path": "/dev/ptp0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 1, "path": "/dev/ptp1", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 246, "minor": 2, "path": "/dev/ptp2", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 8, "path": "/dev/random", "type": "c", "uid": 0 }, { "fileMode": 436, "gid": 109, "major": 10, "minor": 242, "path": "/dev/rfkill", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 248, "minor": 0, "path": "/dev/rtc0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 0, "path": "/dev/sda", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 1, "path": "/dev/sda1", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 2, "path": "/dev/sda2", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 8, "minor": 5, "path": "/dev/sda5", "type": "b", "uid": 0 }, { "fileMode": 432, "gid": 6, "major": 21, "minor": 0, "path": "/dev/sg0", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 231, "path": "/dev/snapshot", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 1, "path": "/dev/snd/seq", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 29, "major": 116, "minor": 33, "path": "/dev/snd/timer", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 5, "major": 5, "minor": 0, "path": "/dev/tty", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 0, "path": "/dev/tty0", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 1, "path": "/dev/tty1", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 10, "path": "/dev/tty10", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 11, "path": "/dev/tty11", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 12, "path": "/dev/tty12", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 13, "path": "/dev/tty13", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 14, "path": "/dev/tty14", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 15, "path": "/dev/tty15", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 16, "path": "/dev/tty16", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 17, "path": "/dev/tty17", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 18, "path": "/dev/tty18", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 19, "path": "/dev/tty19", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 2, "path": "/dev/tty2", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 20, "path": "/dev/tty20", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 21, "path": "/dev/tty21", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 22, "path": "/dev/tty22", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 23, "path": "/dev/tty23", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 24, "path": "/dev/tty24", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 25, "path": "/dev/tty25", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 26, "path": "/dev/tty26", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 27, "path": "/dev/tty27", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 28, "path": "/dev/tty28", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 29, "path": "/dev/tty29", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 3, "path": "/dev/tty3", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 30, "path": "/dev/tty30", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 31, "path": "/dev/tty31", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 32, "path": "/dev/tty32", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 33, "path": "/dev/tty33", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 34, "path": "/dev/tty34", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 35, "path": "/dev/tty35", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 36, "path": "/dev/tty36", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 37, "path": "/dev/tty37", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 38, "path": "/dev/tty38", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 39, "path": "/dev/tty39", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 4, "path": "/dev/tty4", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 40, "path": "/dev/tty40", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 41, "path": "/dev/tty41", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 42, "path": "/dev/tty42", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 43, "path": "/dev/tty43", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 44, "path": "/dev/tty44", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 45, "path": "/dev/tty45", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 46, "path": "/dev/tty46", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 47, "path": "/dev/tty47", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 48, "path": "/dev/tty48", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 49, "path": "/dev/tty49", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 5, "path": "/dev/tty5", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 50, "path": "/dev/tty50", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 51, "path": "/dev/tty51", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 52, "path": "/dev/tty52", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 53, "path": "/dev/tty53", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 54, "path": "/dev/tty54", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 55, "path": "/dev/tty55", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 56, "path": "/dev/tty56", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 57, "path": "/dev/tty57", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 58, "path": "/dev/tty58", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 59, "path": "/dev/tty59", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 6, "path": "/dev/tty6", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 60, "path": "/dev/tty60", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 61, "path": "/dev/tty61", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 62, "path": "/dev/tty62", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 63, "path": "/dev/tty63", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 7, "path": "/dev/tty7", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 8, "path": "/dev/tty8", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 9, "path": "/dev/tty9", "type": "c", "uid": 0 }, { "fileMode": 400, "gid": 5, "major": 4, "minor": 64, "path": "/dev/ttyS0", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 65, "path": "/dev/ttyS1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 74, "path": "/dev/ttyS10", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 75, "path": "/dev/ttyS11", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 76, "path": "/dev/ttyS12", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 77, "path": "/dev/ttyS13", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 78, "path": "/dev/ttyS14", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 79, "path": "/dev/ttyS15", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 80, "path": "/dev/ttyS16", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 81, "path": "/dev/ttyS17", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 82, "path": "/dev/ttyS18", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 83, "path": "/dev/ttyS19", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 66, "path": "/dev/ttyS2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 84, "path": "/dev/ttyS20", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 85, "path": "/dev/ttyS21", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 86, "path": "/dev/ttyS22", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 87, "path": "/dev/ttyS23", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 88, "path": "/dev/ttyS24", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 89, "path": "/dev/ttyS25", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 90, "path": "/dev/ttyS26", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 91, "path": "/dev/ttyS27", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 92, "path": "/dev/ttyS28", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 93, "path": "/dev/ttyS29", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 67, "path": "/dev/ttyS3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 94, "path": "/dev/ttyS30", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 95, "path": "/dev/ttyS31", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 68, "path": "/dev/ttyS4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 69, "path": "/dev/ttyS5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 70, "path": "/dev/ttyS6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 71, "path": "/dev/ttyS7", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 72, "path": "/dev/ttyS8", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 20, "major": 4, "minor": 73, "path": "/dev/ttyS9", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 5, "minor": 3, "path": "/dev/ttyprintk", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 121, "major": 10, "minor": 125, "path": "/dev/udmabuf", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 239, "path": "/dev/uhid", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 223, "path": "/dev/uinput", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 9, "path": "/dev/urandom", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 240, "path": "/dev/userio", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 0, "path": "/dev/vcs", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 1, "path": "/dev/vcs1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 2, "path": "/dev/vcs2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 3, "path": "/dev/vcs3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 4, "path": "/dev/vcs4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 5, "path": "/dev/vcs5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 6, "path": "/dev/vcs6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 128, "path": "/dev/vcsa", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 129, "path": "/dev/vcsa1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 130, "path": "/dev/vcsa2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 131, "path": "/dev/vcsa3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 132, "path": "/dev/vcsa4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 133, "path": "/dev/vcsa5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 134, "path": "/dev/vcsa6", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 64, "path": "/dev/vcsu", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 65, "path": "/dev/vcsu1", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 66, "path": "/dev/vcsu2", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 67, "path": "/dev/vcsu3", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 68, "path": "/dev/vcsu4", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 69, "path": "/dev/vcsu5", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 5, "major": 7, "minor": 70, "path": "/dev/vcsu6", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 10, "minor": 196, "path": "/dev/vfio/vfio", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 127, "path": "/dev/vga_arbiter", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 137, "path": "/dev/vhci", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 238, "path": "/dev/vhost-net", "type": "c", "uid": 0 }, { "fileMode": 432, "gid": 103, "major": 10, "minor": 241, "path": "/dev/vhost-vsock", "type": "c", "uid": 0 }, { "fileMode": 438, "gid": 0, "major": 1, "minor": 5, "path": "/dev/zero", "type": "c", "uid": 0 }, { "fileMode": 384, "gid": 0, "major": 10, "minor": 249, "path": "/dev/zfs", "type": "c", "uid": 0 } ], "namespaces": [ { "type": "pid" }, { "path": "/proc/453/ns/ipc", "type": "ipc" }, { "path": "/proc/453/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/453/ns/net", "type": "network" } ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": true } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "rw" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "rw" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/run/xtables.lock", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/xtables.lock", "type": "bind" }, { "destination": "/lib/modules", "options": [ "rbind", "rprivate", "ro" ], "source": "/lib/modules", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085/shm", "type": "bind" }, { "destination": "/var/lib/kube-proxy", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=v132-worker2" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_DAC_READ_SEARCH", "CAP_FOWNER", "CAP_FSETID", "CAP_KILL", "CAP_SETGID", "CAP_SETUID", "CAP_SETPCAP", "CAP_LINUX_IMMUTABLE", "CAP_NET_BIND_SERVICE", "CAP_NET_BROADCAST", "CAP_NET_ADMIN", "CAP_NET_RAW", "CAP_IPC_LOCK", "CAP_IPC_OWNER", "CAP_SYS_MODULE", "CAP_SYS_RAWIO", "CAP_SYS_CHROOT", "CAP_SYS_PTRACE", "CAP_SYS_PACCT", "CAP_SYS_ADMIN", "CAP_SYS_BOOT", "CAP_SYS_NICE", "CAP_SYS_RESOURCE", "CAP_SYS_TIME", "CAP_SYS_TTY_CONFIG", "CAP_MKNOD", "CAP_LEASE", "CAP_AUDIT_WRITE", "CAP_AUDIT_CONTROL", "CAP_SETFCAP", "CAP_MAC_OVERRIDE", "CAP_MAC_ADMIN", "CAP_SYSLOG", "CAP_WAKE_ALARM", "CAP_BLOCK_SUSPEND", "CAP_AUDIT_READ", "CAP_PERFMON", "CAP_BPF", "CAP_CHECKPOINT_RESTORE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=v132-worker2", "NODE_NAME=v132-worker2", "KUBE_DNS_PORT_53_TCP=tcp://10.96.0.10:53", "KUBE_DNS_PORT_9153_TCP=tcp://10.96.0.10:9153", "KUBE_DNS_PORT_9153_TCP_PROTO=tcp", "KUBE_DNS_PORT_9153_TCP_PORT=9153", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT=53", "KUBE_DNS_SERVICE_PORT_METRICS=9153", "KUBE_DNS_PORT_9153_TCP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_UDP_PORT=53", "KUBE_DNS_PORT_53_TCP_PORT=53", "KUBE_DNS_PORT_53_TCP_ADDR=10.96.0.10", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBE_DNS_PORT=udp://10.96.0.10:53", "KUBE_DNS_PORT_53_UDP_PROTO=udp", "KUBE_DNS_SERVICE_HOST=10.96.0.10", "KUBE_DNS_SERVICE_PORT_DNS_TCP=53", "KUBE_DNS_PORT_53_UDP_ADDR=10.96.0.10", "KUBE_DNS_PORT_53_TCP_PROTO=tcp", "KUBE_DNS_SERVICE_PORT_DNS=53", "KUBE_DNS_PORT_53_UDP=udp://10.96.0.10:53", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "646f9e85a4ca992d8531b36c194f4c3eb6c44f7484fd39cc90c395f437406085", "snapshotKey": "4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "d694c602", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-06-10T13:24:44.328610526Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "4defbeab92b883843a294687cfbe84cc3b70cf1ef4d4fc341bd48d19bd5f779e", "image": { "annotations": {}, "image": "registry.k8s.io/kube-proxy-amd64:v1.32.5", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "sha256:f532b7356fac4d7c4e4f6763bb5a15a43e3bb740c9fb26c85b906a4d971f2363", "labels": { "io.kubernetes.container.name": "kube-proxy", "io.kubernetes.pod.name": "kube-proxy-qwd9g", "io.kubernetes.pod.namespace": "kube-system", "io.kubernetes.pod.uid": "1d807b5e-b228-4490-8496-542366a3b2d9" }, "logPath": "/var/log/pods/kube-system_kube-proxy-qwd9g_1d807b5e-b228-4490-8496-542366a3b2d9/kube-proxy/0.log", "message": "", "metadata": { "attempt": 0, "name": "kube-proxy" }, "mounts": [ { "containerPath": "/var/lib/kube-proxy", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~configmap/kube-proxy", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/run/xtables.lock", "gidMappings": [], "hostPath": "/run/xtables.lock", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/lib/modules", "gidMappings": [], "hostPath": "/lib/modules", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/volumes/kubernetes.io~projected/kube-api-access-hwxmv", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/1d807b5e-b228-4490-8496-542366a3b2d9/containers/kube-proxy/c416ff39", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-06-10T13:24:44.61595435Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:05:39] INFO -- CNTI: node_pid_by_container_id pid: 515 [2025-07-10 12:05:39] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:39] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:39] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:39] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:39] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:39] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:39] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/usr/local/bin/kube-proxy\u0000--config=/var/lib/kube-proxy/config.conf\u0000--hostname-override=v132-worker2\u0000", error: ""} [2025-07-10 12:05:39] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:39] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:39] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:39] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:39] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:39] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t515\nNgid:\t568923\nPid:\t515\nPPid:\t407\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t515\t1\nNSpid:\t515\t1\nNSpgid:\t515\t1\nNSsid:\t515\t1\nVmPeak:\t 1299708 kB\nVmSize:\t 1299708 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56944 kB\nVmRSS:\t 34364 kB\nRssAnon:\t 19532 kB\nRssFile:\t 14832 kB\nRssShmem:\t 0 kB\nVmData:\t 74880 kB\nVmStk:\t 132 kB\nVmExe:\t 30360 kB\nVmLib:\t 8 kB\nVmPTE:\t 280 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t34\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t211772\nnonvoluntary_ctxt_switches:\t607\n", error: ""} [2025-07-10 12:05:40] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:40] DEBUG -- CNTI: container_statuses: [{"containerID" => "containerd://42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:01:50Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-kv6q9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:05:40] INFO -- CNTI: node_pid_by_container_id container_id: containerd://42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2 [2025-07-10 12:05:40] INFO -- CNTI: parse_container_id container_id: containerd://42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2 [2025-07-10 12:05:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:40] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:05:40Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:05:40Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:05:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"22c004da\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-leader-elect=true\"\n ],\n \"command\": [\n \"chaos-operator\"\n ],\n \"envs\": [\n {\n \"key\": \"CHAOS_RUNNER_IMAGE\",\n \"value\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0\"\n },\n {\n \"key\": \"WATCH_NAMESPACE\"\n },\n {\n \"key\": \"POD_NAME\",\n \"value\": \"chaos-operator-ce-7d9fdb77d5-79ccw\"\n },\n {\n \"key\": \"POD_NAMESPACE\",\n \"value\": \"litmus\"\n },\n {\n \"key\": \"OPERATOR_NAME\",\n \"value\": \"chaos-operator\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:feb9fa7af3287f70de9d9d07874894380e09996165152bbfc481b0011bf82b12\",\n \"user_specified_image\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"chaos-operator\",\n \"io.kubernetes.pod.name\": \"chaos-operator-ce-7d9fdb77d5-79ccw\",\n \"io.kubernetes.pod.namespace\": \"litmus\",\n \"io.kubernetes.pod.uid\": \"41e1a9e6-e84c-416c-93c6-af2c070c38e1\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_shares\": 2,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"oom_score_adj\": 1000\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_username\": \"litmus\",\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"chaos-operator/0.log\",\n \"metadata\": {\n \"name\": \"chaos-operator\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7\"\n }\n ]\n },\n \"pid\": 2602708,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"chaos-operator\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\",\n \"io.kubernetes.cri.sandbox-id\": \"33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a\",\n \"io.kubernetes.cri.sandbox-name\": \"chaos-operator-ce-7d9fdb77d5-79ccw\",\n \"io.kubernetes.cri.sandbox-namespace\": \"litmus\",\n \"io.kubernetes.cri.sandbox-uid\": \"41e1a9e6-e84c-416c-93c6-af2c070c38e1\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-besteffort-pod41e1a9e6_e84c_416c_93c6_af2c070c38e1.slice:cri-containerd:42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2602681/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2602681/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2602681/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"shares\": 2\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {}\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"chaos-operator\",\n \"-leader-elect=true\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/litmus\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=chaos-operator-ce-7d9fdb77d5-79ccw\",\n \"APP_USER=litmus\",\n \"APP_DIR=/litmus\",\n \"DATA_DIR=/litmus/data\",\n \"CONF_DIR=/litmus/conf\",\n \"OPERATOR=/usr/local/bin/chaos-operator\",\n \"CHAOS_RUNNER_IMAGE=litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0\",\n \"WATCH_NAMESPACE=\",\n \"POD_NAME=chaos-operator-ce-7d9fdb77d5-79ccw\",\n \"POD_NAMESPACE=litmus\",\n \"OPERATOR_NAME=chaos-operator\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT=443\"\n ],\n \"oomScoreAdj\": 1000,\n \"user\": {\n \"additionalGids\": [\n 1000\n ],\n \"gid\": 1000,\n \"uid\": 1000\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a\",\n \"snapshotKey\": \"42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"22c004da\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:01:49.890918533Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"chaos-operator\",\n \"io.kubernetes.pod.name\": \"chaos-operator-ce-7d9fdb77d5-79ccw\",\n \"io.kubernetes.pod.namespace\": \"litmus\",\n \"io.kubernetes.pod.uid\": \"41e1a9e6-e84c-416c-93c6-af2c070c38e1\"\n },\n \"logPath\": \"/var/log/pods/litmus_chaos-operator-ce-7d9fdb77d5-79ccw_41e1a9e6-e84c-416c-93c6-af2c070c38e1/chaos-operator/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"chaos-operator\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"0\",\n \"cpuShares\": \"2\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"0\",\n \"memorySwapLimitInBytes\": \"0\",\n \"oomScoreAdj\": \"1000\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:01:50.109627712Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"1000\",\n \"supplementalGroups\": [\n \"1000\"\n ],\n \"uid\": \"1000\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:05:40Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:05:40Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:05:40] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "22c004da", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "envs": [ { "key": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "key": "WATCH_NAMESPACE" }, { "key": "POD_NAME", "value": "chaos-operator-ce-7d9fdb77d5-79ccw" }, { "key": "POD_NAMESPACE", "value": "litmus" }, { "key": "OPERATOR_NAME", "value": "chaos-operator" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" } ], "image": { "image": "sha256:feb9fa7af3287f70de9d9d07874894380e09996165152bbfc481b0011bf82b12", "user_specified_image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" }, "labels": { "io.kubernetes.container.name": "chaos-operator", "io.kubernetes.pod.name": "chaos-operator-ce-7d9fdb77d5-79ccw", "io.kubernetes.pod.namespace": "litmus", "io.kubernetes.pod.uid": "41e1a9e6-e84c-416c-93c6-af2c070c38e1" }, "linux": { "resources": { "cpu_period": 100000, "cpu_shares": 2, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "oom_score_adj": 1000 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_username": "litmus", "seccomp": { "profile_type": 1 } } }, "log_path": "chaos-operator/0.log", "metadata": { "name": "chaos-operator" }, "mounts": [ { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7" } ] }, "pid": 2602708, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "chaos-operator", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "io.kubernetes.cri.sandbox-id": "33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a", "io.kubernetes.cri.sandbox-name": "chaos-operator-ce-7d9fdb77d5-79ccw", "io.kubernetes.cri.sandbox-namespace": "litmus", "io.kubernetes.cri.sandbox-uid": "41e1a9e6-e84c-416c-93c6-af2c070c38e1" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-besteffort-pod41e1a9e6_e84c_416c_93c6_af2c070c38e1.slice:cri-containerd:42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2602681/ns/ipc", "type": "ipc" }, { "path": "/proc/2602681/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2602681/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "shares": 2 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": {} } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "chaos-operator", "-leader-elect=true" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/litmus", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=chaos-operator-ce-7d9fdb77d5-79ccw", "APP_USER=litmus", "APP_DIR=/litmus", "DATA_DIR=/litmus/data", "CONF_DIR=/litmus/conf", "OPERATOR=/usr/local/bin/chaos-operator", "CHAOS_RUNNER_IMAGE=litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0", "WATCH_NAMESPACE=", "POD_NAME=chaos-operator-ce-7d9fdb77d5-79ccw", "POD_NAMESPACE=litmus", "OPERATOR_NAME=chaos-operator", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT=443" ], "oomScoreAdj": 1000, "user": { "additionalGids": [ 1000 ], "gid": 1000, "uid": 1000 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "33f31c9eaba56930f88dcf5477fbb9c40e0596ee10b1d78801b8d4aaf1b76d4a", "snapshotKey": "42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "22c004da", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:01:49.890918533Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "42bbebf09edf0c587fd4d67333e9b550d76e54fc5c98192161864ef5644077f2", "image": { "annotations": {}, "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "labels": { "io.kubernetes.container.name": "chaos-operator", "io.kubernetes.pod.name": "chaos-operator-ce-7d9fdb77d5-79ccw", "io.kubernetes.pod.namespace": "litmus", "io.kubernetes.pod.uid": "41e1a9e6-e84c-416c-93c6-af2c070c38e1" }, "logPath": "/var/log/pods/litmus_chaos-operator-ce-7d9fdb77d5-79ccw_41e1a9e6-e84c-416c-93c6-af2c070c38e1/chaos-operator/0.log", "message": "", "metadata": { "attempt": 0, "name": "chaos-operator" }, "mounts": [ { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/volumes/kubernetes.io~projected/kube-api-access-kv6q9", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/41e1a9e6-e84c-416c-93c6-af2c070c38e1/containers/chaos-operator/bfa99cf7", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "0", "cpuShares": "2", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "0", "memorySwapLimitInBytes": "0", "oomScoreAdj": "1000", "unified": {} } }, "startedAt": "2025-07-10T12:01:50.109627712Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "1000", "supplementalGroups": [ "1000" ], "uid": "1000" } } } } [2025-07-10 12:05:40] INFO -- CNTI: node_pid_by_container_id pid: 2602708 [2025-07-10 12:05:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "chaos-operator\u0000-leader-elect=true\u0000", error: ""} [2025-07-10 12:05:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:05:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:05:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:05:41] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602708\nNgid:\t0\nPid:\t2602708\nPPid:\t2602657\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t2602708\t1\nNSpid:\t2602708\t1\nNSpgid:\t2602708\t1\nNSsid:\t2602708\t1\nVmPeak:\t 1262188 kB\nVmSize:\t 1262188 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38344 kB\nVmRSS:\t 38344 kB\nRssAnon:\t 14800 kB\nRssFile:\t 23544 kB\nRssShmem:\t 0 kB\nVmData:\t 67012 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t36\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t825\nnonvoluntary_ctxt_switches:\t16\n", error: ""} [2025-07-10 12:05:41] DEBUG -- CNTI-find_matching_processes: [2025-07-10 12:05:41] INFO -- CNTI-prometheus_traffic:process_search: Found 4 matching processes for prometheus [2025-07-10 12:05:41] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 2435113 [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-7cfb59478c-8bh89 to service [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:05:41] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-07-10 12:05:41] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-7ccf77cb5b-6vxxn, gatekeeper-controller-manager-7cfb59478c-6kqfs, gatekeeper-controller-manager-7cfb59478c-8bh89, gatekeeper-controller-manager-7cfb59478c-8xsck [2025-07-10 12:05:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:42] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-07-10 12:05:42] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-668d6bf9bc-7q27c, coredns-668d6bf9bc-xdthc [2025-07-10 12:05:42] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-7cfb59478c-8bh89 matched to service: gatekeeper-webhook-service [2025-07-10 12:05:42] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-07-10 12:05:42] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:05:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:43] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:05:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:43] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-htvs5, cluster-tools-2gwh4 [2025-07-10 12:05:43] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:43] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:43] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:44] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-07-10 12:05:44] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-07-10 12:05:44] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-07-10 12:05:44] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 2435104 [2025-07-10 12:05:44] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-7cfb59478c-8xsck to service [2025-07-10 12:05:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-07-10 12:05:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:44] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:05:44] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:44] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-07-10 12:05:45] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-7ccf77cb5b-6vxxn, gatekeeper-controller-manager-7cfb59478c-6kqfs, gatekeeper-controller-manager-7cfb59478c-8bh89, gatekeeper-controller-manager-7cfb59478c-8xsck [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-07-10 12:05:45] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-668d6bf9bc-7q27c, coredns-668d6bf9bc-xdthc [2025-07-10 12:05:45] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-7cfb59478c-8xsck matched to service: gatekeeper-webhook-service [2025-07-10 12:05:45] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:45] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:46] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:05:46] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:46] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-htvs5, cluster-tools-2gwh4 [2025-07-10 12:05:46] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:46] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:47] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:47] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:47] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-07-10 12:05:47] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-07-10 12:05:47] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-07-10 12:05:47] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 2603964 [2025-07-10 12:05:47] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-audit-7ccf77cb5b-6vxxn to service [2025-07-10 12:05:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-07-10 12:05:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:47] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:05:47] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:47] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-07-10 12:05:48] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-7ccf77cb5b-6vxxn, gatekeeper-controller-manager-7cfb59478c-6kqfs, gatekeeper-controller-manager-7cfb59478c-8bh89, gatekeeper-controller-manager-7cfb59478c-8xsck [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-07-10 12:05:48] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-668d6bf9bc-7q27c, coredns-668d6bf9bc-xdthc [2025-07-10 12:05:48] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-audit-7ccf77cb5b-6vxxn matched to service: gatekeeper-webhook-service [2025-07-10 12:05:48] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:49] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:05:49] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:49] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-htvs5, cluster-tools-2gwh4 [2025-07-10 12:05:49] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:50] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:50] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 [2025-07-10 12:05:50] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-07-10 12:05:50] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-07-10 12:05:50] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-07-10 12:05:50] INFO -- CNTI-prometheus_traffic:service_for_pod: Checking process: 2603972 [2025-07-10 12:05:50] DEBUG -- CNTI-KubectlClient.Get.service_by_pod: Matching pod: gatekeeper-controller-manager-7cfb59478c-6kqfs to service [2025-07-10 12:05:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource service [2025-07-10 12:05:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:50] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:05:50] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:05:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app" => "gatekeeper", "chart" => "gatekeeper", "control-plane" => "controller-manager", "gatekeeper.sh/operation" => "webhook", "gatekeeper.sh/system" => "yes", "heritage" => "Helm", "release" => "opa-gatekeeper"} [2025-07-10 12:05:51] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 4 pods: gatekeeper-audit-7ccf77cb5b-6vxxn, gatekeeper-controller-manager-7cfb59478c-6kqfs, gatekeeper-controller-manager-7cfb59478c-8bh89, gatekeeper-controller-manager-7cfb59478c-8xsck [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"k8s-app" => "kube-dns"} [2025-07-10 12:05:51] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 2 pods: coredns-668d6bf9bc-7q27c, coredns-668d6bf9bc-xdthc [2025-07-10 12:05:51] INFO -- CNTI-KubectlClient.Get.service_by_pod: Pod: gatekeeper-controller-manager-7cfb59478c-6kqfs matched to service: gatekeeper-webhook-service [2025-07-10 12:05:51] INFO -- CNTI-prometheus_traffic:service_url: Checking ports on service_name: gatekeeper-webhook-service [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieving list of schedulable nodes [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:52] INFO -- CNTI-KubectlClient.Get.schedulable_nodes_list: Retrieved schedulable nodes list: v132-worker, v132-worker2 [2025-07-10 12:05:52] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:05:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:52] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 2 pods: cluster-tools-htvs5, cluster-tools-2gwh4 [2025-07-10 12:05:52] INFO -- CNTI: cluster_tools_pod_name: cluster-tools-htvs5 [2025-07-10 12:05:52] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:53] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:53] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-htvs5 ⏭️ ✨SKIPPED: [prometheus_traffic] Prometheus server not found 📶☠️ [2025-07-10 12:05:53] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 curl: (60) SSL certificate problem: unable to get local issuer certificate More details here: https://curl.se/docs/sslcerts.html curl failed to verify the legitimacy of the server and therefore could not establish a secure connection to it. To learn more about this situation and how to fix it, please visit the web page mentioned above. command terminated with exit code 60 [2025-07-10 12:05:53] DEBUG -- CNTI: prom_api_resp: {status: Process::Status[60], output: "", error: " % Total % Received % Xferd Average Speed Time Time Time Current\n Dload Upload Total Spent Left Speed\n\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\r 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\ncurl: (60) SSL certificate problem: unable to get local issuer certificate\nMore details here: https://curl.se/docs/sslcerts.html\n\ncurl failed to verify the legitimacy of the server and therefore could not\nestablish a secure connection to it. To learn more about this situation and\nhow to fix it, please visit the web page mentioned above.\ncommand terminated with exit code 60\n"} [2025-07-10 12:05:53] INFO -- CNTI-prometheus_traffic:service_url_fail: Failed prometheus service_url: https://gatekeeper-webhook-service.cnf-testsuite.svc.cluster.local:443 [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'prometheus_traffic' emoji: 📶☠️ [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'prometheus_traffic' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points: Task: 'prometheus_traffic' type: bonus [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Points.task_points: Task: prometheus_traffic is worth: 0 points [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'prometheus_traffic' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points: Task: 'prometheus_traffic' type: bonus [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-prometheus_traffic: Task start time: 2025-07-10 12:05:21 UTC, end time: 2025-07-10 12:05:53 UTC [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Points.upsert_task-prometheus_traffic: Task: 'prometheus_traffic' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:31.792887140 [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:53] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:53] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:53] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [open_metrics] [2025-07-10 12:05:53] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Task.task_runner.open_metrics: Starting test [2025-07-10 12:05:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmap/cnf-testsuite-open-metrics ⏭️ ✨SKIPPED: [open_metrics] Prometheus traffic not configured 📶☠️ [2025-07-10 12:05:53] WARN -- CNTI-KubectlClient.Get.resource.cmd: stderr: Error from server (NotFound): configmaps "cnf-testsuite-open-metrics" not found [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'open_metrics' emoji: 📶☠️ [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'open_metrics' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points: Task: 'open_metrics' type: bonus [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Points.task_points: Task: open_metrics is worth: 0 points [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'open_metrics' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points: Task: 'open_metrics' type: bonus [2025-07-10 12:05:53] DEBUG -- CNTI-CNFManager.Points.upsert_task-open_metrics: Task start time: 2025-07-10 12:05:53 UTC, end time: 2025-07-10 12:05:53 UTC [2025-07-10 12:05:53] INFO -- CNTI-CNFManager.Points.upsert_task-open_metrics: Task: 'open_metrics' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.130168342 [2025-07-10 12:05:53] INFO -- CNTI-Setup.install_cluster_tools: Installing cluster_tools on the cluster [2025-07-10 12:05:53] INFO -- CNTI: ClusterTools install [2025-07-10 12:05:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:53] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:53] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file cluster_tools.yml [2025-07-10 12:05:53] INFO -- CNTI: ClusterTools wait_for_cluster_tools [2025-07-10 12:05:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource namespaces [2025-07-10 12:05:54] DEBUG -- CNTI: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T12:00:09Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4609333", "uid" => "2fa1053e-2247-431a-a7bd-55949753de2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-07-10T11:59:54Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4609283", "uid" => "1200b6cd-9f02-43ed-bc2c-3325053a62d7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "20", "uid" => "e9c1e555-d421-479b-99da-e15b9e4cbe23"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "27", "uid" => "142e6851-3c72-4ad7-80c0-9a06f7ec29a7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "12", "uid" => "6d5c8018-e87c-4144-ad35-175aba623785"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-06-10T13:24:29Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "5", "uid" => "3623b17d-eebf-47da-aa4d-8431d7e16dcc"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-07-10T12:01:43Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4609766", "uid" => "35087ef5-ded0-4b24-a82c-cfa84cf47224"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-06-10T13:24:34Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "323", "uid" => "5e7cc0e6-da8e-4014-a795-6c248d992a2a"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] [2025-07-10 12:05:54] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Daemonset/cluster-tools to install [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Daemonset/cluster-tools is ready [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.replica_count: Get replica count of Daemonset/cluster-tools [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Daemonset/cluster-tools [2025-07-10 12:05:54] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Daemonset/cluster-tools is ready [2025-07-10 12:05:54] INFO -- CNTI-Setup.install_cluster_tools: cluster_tools has been installed on the cluster [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [routed_logs] [2025-07-10 12:05:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Task.task_runner.routed_logs: Starting test [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name image_name: fluent/fluentd-kubernetes-daemonset [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name image_name: bitnami/fluentd [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ ✨SKIPPED: [routed_logs] Fluentd or FluentBit not configured 📶☠️ [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name image_name: fluent/fluent-bit [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'routed_logs' emoji: 📶☠️ [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'routed_logs' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points: Task: 'routed_logs' type: bonus [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: routed_logs is worth: 0 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'routed_logs' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points: Task: 'routed_logs' type: bonus [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.upsert_task-routed_logs: Task start time: 2025-07-10 12:05:54 UTC, end time: 2025-07-10 12:05:54 UTC [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.upsert_task-routed_logs: Task: 'routed_logs' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.427168995 [2025-07-10 12:05:54] INFO -- CNTI-tracing: Running test [2025-07-10 12:05:54] INFO -- CNTI-tracing: tracing args: # [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:54] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:54] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [tracing] [2025-07-10 12:05:54] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Task.task_runner.tracing: Starting test [2025-07-10 12:05:54] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ ✨SKIPPED: [tracing] Jaeger not configured ⎈🚀 Observability and diagnostics results: 1 of 1 tests passed  [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name image_name: jaegertracing/jaeger-collector [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] INFO -- CNTI: jaeger match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'tracing' emoji: ⎈🚀 [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'tracing' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points: Task: 'tracing' type: bonus [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: tracing is worth: 0 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'tracing' tags: ["observability", "dynamic", "workload", "bonus"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points: Task: 'tracing' type: bonus [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.upsert_task-tracing: Task start time: 2025-07-10 12:05:54 UTC, end time: 2025-07-10 12:05:54 UTC [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.upsert_task-tracing: Task: 'tracing' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.158855787 [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tags: ["observability"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["observability"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 100, max tasks passed: 1 for tags: ["observability"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tags: ["observability"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 100, total tasks passed: 1 for tags: ["observability"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: observability [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 100, max tasks passed: 1 for tags: ["observability"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1100, total tasks passed: 11 for tags: ["essential"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap"] [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:05:54] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:54] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-07-10 12:05:55] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 320, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-07-10 12:05:55] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-07-10 12:05:55] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}]} [2025-07-10 12:05:55] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}], "maximum_points" => 100} [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:05:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:05:55] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:05:55] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:05:55] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [reasonable_image_size] [2025-07-10 12:05:55] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:05:55] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:05:55] INFO -- CNTI-CNFManager.Task.task_runner.reasonable_image_size: Starting test [2025-07-10 12:05:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource configmap/docker-config [2025-07-10 12:05:55] WARN -- CNTI-KubectlClient.Get.resource.cmd: stderr: Error from server (NotFound): configmaps "docker-config" not found [2025-07-10 12:05:55] INFO -- CNTI: Install dockerd from manifest [2025-07-10 12:05:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/docker-config-manifest.yml [2025-07-10 12:05:55] INFO -- CNTI: Install dockerd from manifest [2025-07-10 12:05:55] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/dockerd-manifest.yml [2025-07-10 12:05:55] WARN -- CNTI-KubectlClient.Apply.file.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": privileged (container "dockerd" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "dockerd" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "dockerd" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "dockerd" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "dockerd" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:05:55] INFO -- CNTI: Wait for dockerd install [2025-07-10 12:05:55] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Waiting for resource Pod/dockerd to install [2025-07-10 12:05:55] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:05:55] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:05:55] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:55] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-07-10 12:05:55] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: seconds elapsed while waiting: 0 [2025-07-10 12:05:56] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:05:56] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:05:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:57] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-07-10 12:05:58] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:05:58] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:05:58] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:58] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-07-10 12:05:59] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:05:59] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:05:59] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:05:59] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-07-10 12:06:00] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:06:00] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:06:00] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:00] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource Pod/dockerd is ready [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/dockerd* with field selector: [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:01] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: dockerd [2025-07-10 12:06:01] INFO -- CNTI-KubectlClient.wait.resource_wait_for_install: Pod/dockerd is ready [2025-07-10 12:06:01] DEBUG -- CNTI-reasonable_image_size: cnf_config: # [2025-07-10 12:06:01] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:06:01] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:01] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:01] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:01] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:01] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:06:01] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:02] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:02] INFO -- CNTI: FQDN of the docker image: coredns/coredns:1.8.0 [2025-07-10 12:06:02] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-07-10 12:06:03] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: toomanyrequests: You have reached your unauthenticated pull rate limit. https://www.docker.com/increase-rate-limit command terminated with exit code 1 [2025-07-10 12:06:03] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-07-10 12:06:04] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: Error response from daemon: reference does not exist command terminated with exit code 1 [2025-07-10 12:06:04] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd [2025-07-10 12:06:04] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: gzip: /tmp/image.tar: No such file or directory command terminated with exit code 1 [2025-07-10 12:06:04] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod dockerd ✖️ FAILED: [reasonable_image_size] Image size too large 🦖 ⚖👀 [2025-07-10 12:06:04] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: wc: /tmp/image.tar.gz: No such file or directory command terminated with exit code 1 [2025-07-10 12:06:04] INFO -- CNTI: compressed_size: coredns/coredns:1.8.0 = '' [2025-07-10 12:06:04] ERROR -- CNTI-reasonable_image_size: invalid compressed_size: coredns/coredns:1.8.0 = '', Invalid Int64: "" [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: false [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'reasonable_image_size' emoji: ⚖👀 [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_image_size' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_image_size' type: normal [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 0 points [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_image_size' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_image_size' type: normal [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Points.upsert_task-reasonable_image_size: Task start time: 2025-07-10 12:05:55 UTC, end time: 2025-07-10 12:06:04 UTC [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.Points.upsert_task-reasonable_image_size: Task: 'reasonable_image_size' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:09.505480596 [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:04] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:04] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:04] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:04] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:04] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [reasonable_startup_time] [2025-07-10 12:06:04] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:04] INFO -- CNTI-CNFManager.Task.task_runner.reasonable_startup_time: Starting test [2025-07-10 12:06:04] DEBUG -- CNTI: helm [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:04] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:04] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:04] INFO -- CNTI-reasonable_startup_time: resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} [2025-07-10 12:06:04] INFO -- CNTI: total_period_failure: 30 [2025-07-10 12:06:04] INFO -- CNTI: total_extended_period: 90 [2025-07-10 12:06:04] INFO -- CNTI: startup_time: 0 [2025-07-10 12:06:04] INFO -- CNTI: adjusted_with_default: 30 [2025-07-10 12:06:04] DEBUG -- CNTI-KubectlClient.Get.match_pods_by_prefix: Get pods with with prefix: cluster-tools with field selector: [2025-07-10 12:06:04] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:04] INFO -- CNTI-KubectlClient.Get.match_pods_by_prefix: Matched pods: cluster-tools-2gwh4, cluster-tools-htvs5 [2025-07-10 12:06:04] INFO -- CNTI-k8s_instrumentation_debug: command: kubectl get all -A [2025-07-10 12:06:05] INFO -- CNTI-k8s_instrumentation_debug: output: NAMESPACE NAME READY STATUS RESTARTS AGE cnf-default pod/coredns-coredns-56898dd654-2js9x 1/1 Running 0 3m46s cnf-testsuite pod/cluster-tools-2gwh4 1/1 Running 0 5m59s cnf-testsuite pod/cluster-tools-htvs5 1/1 Running 0 5m59s cnf-testsuite pod/dockerd 1/1 Running 0 9s cnf-testsuite pod/gatekeeper-audit-7ccf77cb5b-6vxxn 1/1 Running 0 53s cnf-testsuite pod/gatekeeper-controller-manager-7cfb59478c-6kqfs 1/1 Running 0 53s cnf-testsuite pod/gatekeeper-controller-manager-7cfb59478c-8bh89 1/1 Running 0 53s cnf-testsuite pod/gatekeeper-controller-manager-7cfb59478c-8xsck 1/1 Running 0 53s kube-system pod/coredns-668d6bf9bc-7q27c 1/1 Running 0 29d kube-system pod/coredns-668d6bf9bc-xdthc 1/1 Running 0 29d kube-system pod/create-loop-devs-2466n 1/1 Running 0 29d kube-system pod/create-loop-devs-dsrxz 1/1 Running 0 29d kube-system pod/create-loop-devs-nvrsb 1/1 Running 0 29d kube-system pod/etcd-v132-control-plane 1/1 Running 0 29d kube-system pod/kindnet-brb7q 1/1 Running 0 29d kube-system pod/kindnet-xkjck 1/1 Running 0 29d kube-system pod/kindnet-zvx7j 1/1 Running 0 29d kube-system pod/kube-apiserver-v132-control-plane 1/1 Running 0 29d kube-system pod/kube-controller-manager-v132-control-plane 1/1 Running 0 29d kube-system pod/kube-proxy-8hhkt 1/1 Running 0 29d kube-system pod/kube-proxy-qwd9g 1/1 Running 0 29d kube-system pod/kube-proxy-r5tsk 1/1 Running 0 29d kube-system pod/kube-scheduler-v132-control-plane 1/1 Running 0 29d litmus pod/chaos-operator-ce-7d9fdb77d5-79ccw 1/1 Running 0 4m16s local-path-storage pod/local-path-provisioner-7dc846544d-ltv2t 1/1 Running 0 29d NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE cnf-default service/coredns-coredns ClusterIP 10.96.78.210 53/UDP,53/TCP 5m54s cnf-testsuite service/gatekeeper-webhook-service ClusterIP 10.96.139.240 443/TCP 53s default service/kubernetes ClusterIP 10.96.0.1 443/TCP 29d kube-system service/kube-dns ClusterIP 10.96.0.10 53/UDP,53/TCP,9153/TCP 29d NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE cnf-testsuite daemonset.apps/cluster-tools 2 2 2 2 2 5m59s kube-system daemonset.apps/create-loop-devs 3 3 3 3 3 29d kube-system daemonset.apps/kindnet 3 3 3 3 3 kubernetes.io/os=linux 29d kube-system daemonset.apps/kube-proxy 3 3 3 3 3 kubernetes.io/os=linux 29d NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE cnf-default deployment.apps/coredns-coredns 1/1 1 1 5m54s cnf-testsuite deployment.apps/gatekeeper-audit 1/1 1 1 53s cnf-testsuite deployment.apps/gatekeeper-controller-manager 3/3 3 3 53s kube-system deployment.apps/coredns 2/2 2 2 29d litmus deployment.apps/chaos-operator-ce 1/1 1 1 4m20s local-path-storage deployment.apps/local-path-provisioner 1/1 1 1 29d NAMESPACE NAME DESIRED CURRENT READY AGE cnf-default replicaset.apps/coredns-coredns-56898dd654 1 1 1 5m21s cnf-default replicaset.apps/coredns-coredns-64fc886fd4 0 0 0 5m54s cnf-default replicaset.apps/coredns-coredns-7d6945dd49 0 0 0 4m51s cnf-testsuite replicaset.apps/gatekeeper-audit-7ccf77cb5b 1 1 1 53s cnf-testsuite replicaset.apps/gatekeeper-controller-manager-7cfb59478c 3 3 3 53s kube-system replicaset.apps/coredns-668d6bf9bc 2 2 2 29d litmus replicaset.apps/chaos-operator-ce-644fbcd4b7 0 0 0 4m20s litmus replicaset.apps/chaos-operator-ce-7d9fdb77d5 1 1 1 4m16s local-path-storage replicaset.apps/local-path-provisioner-7dc846544d 1 1 1 29d [2025-07-10 12:06:05] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 ✔️ PASSED: [reasonable_startup_time] CNF had a reasonable startup time 🚀  [2025-07-10 12:06:22] DEBUG -- CNTI: parsed_output: {"Extra file open flags" => "(none)", "Running the test with following options" => "", "Number of threads" => "1", "Number of IO requests" => "0", "Read/Write ratio for combined random IO test" => "1.50", "File operations" => "", "reads/s" => "4528.82", "writes/s" => "3019.21", "fsyncs/s" => "9663.67", "Throughput" => "", "read, MiB/s" => "70.76", "written, MiB/s" => "47.18", "General statistics" => "", "total time" => "10.0111s", "total number of events" => "172262", "Latency (ms)" => "", "min" => "0.00", "avg" => "0.06", "max" => "1.30", "95th percentile" => "0.17", "sum" => "9925.64", "Threads fairness" => "", "events (avg/stddev)" => "172262.0000/0.00", "execution time (avg/stddev)" => "9.9256/0.00"} [2025-07-10 12:06:22] INFO -- CNTI: startup_time_limit: 32 [2025-07-10 12:06:22] INFO -- CNTI: startup_time: 30 [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_startup_time' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_startup_time' type: normal [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'reasonable_startup_time' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Points: Task: 'reasonable_startup_time' type: normal [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Points.upsert_task-reasonable_startup_time: Task start time: 2025-07-10 12:06:04 UTC, end time: 2025-07-10 12:06:22 UTC [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.Points.upsert_task-reasonable_startup_time: Task: 'reasonable_startup_time' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:17.706935695 [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:22] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:22] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:22] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:22] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:22] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [single_process_type] [2025-07-10 12:06:22] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:22] INFO -- CNTI-CNFManager.Task.task_runner.single_process_type: Starting test [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:22] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:22] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:22] INFO -- CNTI: Constructed resource_named_tuple: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:06:22] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:22] INFO -- CNTI: pod_name: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:22] INFO -- CNTI: container_statuses: [{"containerID" => "containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:02:20Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] [2025-07-10 12:06:22] INFO -- CNTI: pod_name: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:06:22] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-56898dd654-2js9x list: v132-worker2 [2025-07-10 12:06:22] INFO -- CNTI: nodes_by_resource done [2025-07-10 12:06:22] INFO -- CNTI: before ready containerStatuses container_id 00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:22] INFO -- CNTI: containerStatuses container_id 00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:22] INFO -- CNTI: node_pid_by_container_id container_id: 00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:22] INFO -- CNTI: parse_container_id container_id: 00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:22] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:23] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:23] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:06:23Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:06:23Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:06:23] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\"\n }\n ]\n },\n \"pid\": 2603188,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603161/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603161/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603161/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-56898dd654-2js9x\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"snapshotKey\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:02:19.316789727Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:02:20.898798426Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:06:23Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:06:23Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:06:23] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.78.210" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639" } ] }, "pid": 2603188, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "io.kubernetes.cri.sandbox-name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "e7a23045-b167-4251-b263-10084835e501" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603161/ns/ipc", "type": "ipc" }, { "path": "/proc/2603161/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603161/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-56898dd654-2js9x", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP_PORT=53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "snapshotKey": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:02:19.316789727Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-07-10T12:02:20.898798426Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:06:23] INFO -- CNTI: node_pid_by_container_id pid: 2603188 [2025-07-10 12:06:23] INFO -- CNTI: node pid (should never be pid 1): 2603188 [2025-07-10 12:06:23] INFO -- CNTI: node name : v132-worker2 [2025-07-10 12:06:23] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:23] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:23] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:23] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "2603188\n", error: ""} [2025-07-10 12:06:23] INFO -- CNTI: parsed pids: ["2603188"] [2025-07-10 12:06:23] INFO -- CNTI: all_statuses_by_pids [2025-07-10 12:06:23] INFO -- CNTI: all_statuses_by_pids pid: 2603188 [2025-07-10 12:06:23] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:23] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:23] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:23] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:23] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:24] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-07-10 12:06:24] DEBUG -- CNTI: proc process_statuses_by_node: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n"] [2025-07-10 12:06:24] INFO -- CNTI-proctree_by_pid: proctree_by_pid potential_parent_pid: 2603188 [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: proc_statuses: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n"] [2025-07-10 12:06:24] DEBUG -- CNTI: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 2603188 Ngid: 0 Pid: 2603188 PPid: 2603137 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2603188 1 NSpid: 2603188 1 NSpgid: 2603188 1 NSsid: 2603188 1 VmPeak: 748824 kB VmSize: 748824 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41832 kB VmRSS: 41832 kB RssAnon: 12792 kB RssFile: 29040 kB RssShmem: 0 kB VmData: 108936 kB VmStk: 132 kB VmExe: 22072 kB VmLib: 8 kB VmPTE: 204 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 20 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1543 nonvoluntary_ctxt_switches: 15 [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603188", "Ngid" => "0", "Pid" => "2603188", "PPid" => "2603137", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603188\t1", "NSpid" => "2603188\t1", "NSpgid" => "2603188\t1", "NSsid" => "2603188\t1", "VmPeak" => "748824 kB", "VmSize" => "748824 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41832 kB", "VmRSS" => "41832 kB", "RssAnon" => "12792 kB", "RssFile" => "29040 kB", "RssShmem" => "0 kB", "VmData" => "108936 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "204 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1543", "nonvoluntary_ctxt_switches" => "15"} [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:24] INFO -- CNTI: cmdline_by_pid [2025-07-10 12:06:24] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:24] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:24] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:24] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:24] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 ✔️ 🏆PASSED: [single_process_type] Only one process type used ⚖👀 [2025-07-10 12:06:24] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:24] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: current_pid == potential_parent_pid [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603188", "Ngid" => "0", "Pid" => "2603188", "PPid" => "2603137", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603188\t1", "NSpid" => "2603188\t1", "NSpgid" => "2603188\t1", "NSsid" => "2603188\t1", "VmPeak" => "748824 kB", "VmSize" => "748824 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41832 kB", "VmRSS" => "41832 kB", "RssAnon" => "12792 kB", "RssFile" => "29040 kB", "RssShmem" => "0 kB", "VmData" => "108936 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "204 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1543", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] [2025-07-10 12:06:24] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:24] INFO -- CNTI-single_process_type: status name: coredns [2025-07-10 12:06:24] INFO -- CNTI-single_process_type: previous status name: initial_name [2025-07-10 12:06:24] INFO -- CNTI: container_status_result.all?(true): false [2025-07-10 12:06:24] INFO -- CNTI: pod_resp.all?(true): false [2025-07-10 12:06:24] INFO -- CNTI: Constructed resource_named_tuple: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'single_process_type' emoji: ⚖👀 [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'single_process_type' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points: Task: 'single_process_type' type: essential [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'single_process_type' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points: Task: 'single_process_type' type: essential [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.upsert_task-single_process_type: Task start time: 2025-07-10 12:06:22 UTC, end time: 2025-07-10 12:06:24 UTC [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.Points.upsert_task-single_process_type: Task: 'single_process_type' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:02.173341466 [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:24] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:24] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:24] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:24] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:24] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [service_discovery] [2025-07-10 12:06:24] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.Task.task_runner.service_discovery: Starting test [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:24] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:24] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource services ✔️ ✨PASSED: [service_discovery] Some containers exposed as a service ⚖👀 [2025-07-10 12:06:24] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:06:24] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:24] DEBUG -- CNTI: Matching pods for service coredns-coredns: [{"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-07-10T12:02:18Z", "generateName" => "coredns-coredns-56898dd654-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "56898dd654"}, "name" => "coredns-coredns-56898dd654-2js9x", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-56898dd654", "uid" => "b57e7c68-c1b8-4f31-b9e6-48f06e0da67d"}], "resourceVersion" => "4610019", "uid" => "e7a23045-b167-4251-b263-10084835e501"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-qhngk", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:21Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:32Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:32Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:02:20Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.26", "podIPs" => [{"ip" => "10.244.2.26"}], "qosClass" => "Guaranteed", "startTime" => "2025-07-10T12:02:18Z"}}] [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'service_discovery' emoji: ⚖👀 [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_discovery' tags: ["microservice", "dynamic", "workload", "bonus"] [2025-07-10 12:06:24] DEBUG -- CNTI-CNFManager.Points: Task: 'service_discovery' type: bonus [2025-07-10 12:06:24] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'service_discovery' tags: ["microservice", "dynamic", "workload", "bonus"] [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points: Task: 'service_discovery' type: bonus [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-service_discovery: Task start time: 2025-07-10 12:06:24 UTC, end time: 2025-07-10 12:06:24 UTC [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Points.upsert_task-service_discovery: Task: 'service_discovery' has status: 'passed' and is awarded: 1 points.Runtime: 00:00:00.425237136 [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [shared_database] [2025-07-10 12:06:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Task.task_runner.shared_database: Starting test [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ N/A: [shared_database] [shared_database] No MariaDB containers were found 💾 [2025-07-10 12:06:25] INFO -- CNTI: local_match_by_image_name image_name: bitnami/mariadb [2025-07-10 12:06:25] INFO -- CNTI: local_match_by_image_name tag: match : {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:06:25] INFO -- CNTI: local_match_by_image_name match: {:found => false, :digest => "", :release_name => ""} [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'shared_database' emoji: 💾 [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'shared_database' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points: Task: 'shared_database' type: normal [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Points.task_points: Task: shared_database is worth: 0 points [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'shared_database' tags: ["microservice", "dynamic", "workload", "normal"] [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points: Task: 'shared_database' type: normal [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Points.upsert_task-shared_database: Task start time: 2025-07-10 12:06:25 UTC, end time: 2025-07-10 12:06:25 UTC [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Points.upsert_task-shared_database: Task: 'shared_database' has status: 'na' and is awarded: 0 points.Runtime: 00:00:00.154224324 [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:25] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:25] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:25] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [specialized_init_system] [2025-07-10 12:06:25] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.Task.task_runner.specialized_init_system: Starting test [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:25] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:25] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:25] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:25] INFO -- CNTI-specialized_init_system: Checking resource Deployment/coredns-coredns in cnf-default [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:06:25] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:25] INFO -- CNTI-specialized_init_system: Pod count for resource Deployment/coredns-coredns in cnf-default: 1 [2025-07-10 12:06:25] INFO -- CNTI-specialized_init_system: Inspecting pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-07-10T12:02:18Z", "generateName" => "coredns-coredns-56898dd654-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "56898dd654"}, "name" => "coredns-coredns-56898dd654-2js9x", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-56898dd654", "uid" => "b57e7c68-c1b8-4f31-b9e6-48f06e0da67d"}], "resourceVersion" => "4610019", "uid" => "e7a23045-b167-4251-b263-10084835e501"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.8.0", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-qhngk", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:21Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:32Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:32Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-07-10T12:02:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image" => "docker.io/coredns/coredns:1.8.0", "imageID" => "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-07-10T12:02:20Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-qhngk", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.26", "podIPs" => [{"ip" => "10.244.2.26"}], "qosClass" => "Guaranteed", "startTime" => "2025-07-10T12:02:18Z"}} [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:06:25] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-56898dd654-2js9x list: v132-worker2 [2025-07-10 12:06:25] INFO -- CNTI: parse_container_id container_id: containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:25] INFO -- CNTI: node_pid_by_container_id container_id: 00aaad048b7ef5 [2025-07-10 12:06:25] INFO -- CNTI: parse_container_id container_id: 00aaad048b7ef5 [2025-07-10 12:06:25] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:25] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:26] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:26] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:26] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:26] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:06:26Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:06:26Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:06:26] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\"\n }\n ]\n },\n \"pid\": 2603188,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603161/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603161/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603161/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-56898dd654-2js9x\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"snapshotKey\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:02:19.316789727Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:02:20.898798426Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:06:26Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:06:26Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:06:26] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.78.210" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639" } ] }, "pid": 2603188, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "io.kubernetes.cri.sandbox-name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "e7a23045-b167-4251-b263-10084835e501" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603161/ns/ipc", "type": "ipc" }, { "path": "/proc/2603161/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603161/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-56898dd654-2js9x", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP_PORT=53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "snapshotKey": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:02:19.316789727Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-07-10T12:02:20.898798426Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:06:26] INFO -- CNTI: node_pid_by_container_id pid: 2603188 [2025-07-10 12:06:26] INFO -- CNTI: cmdline_by_pid [2025-07-10 12:06:26] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:26] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:26] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:26] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 pod/coredns-coredns-56898dd654-2js9x has container 'coredns' with /coredns as init process ✖️ 🏆FAILED: [specialized_init_system] Containers do not use specialized init systems (ভ_ভ) ރ 🚀 [2025-07-10 12:06:26] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:26] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:26] INFO -- CNTI-InitSystems.scan: pod/coredns-coredns-56898dd654-2js9x has container 'coredns' with /coredns as init process [2025-07-10 12:06:26] INFO -- CNTI-specialized_init_system: Pod scan result: [InitSystems::InitSystemInfo(@kind="pod", @namespace="cnf-default", @name="coredns-coredns-56898dd654-2js9x", @container="coredns", @init_cmd="/coredns")] [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'specialized_init_system' emoji: 🚀 [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'specialized_init_system' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points: Task: 'specialized_init_system' type: essential [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 0 points [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'specialized_init_system' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points: Task: 'specialized_init_system' type: essential [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Points.upsert_task-specialized_init_system: Task start time: 2025-07-10 12:06:25 UTC, end time: 2025-07-10 12:06:26 UTC [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.Points.upsert_task-specialized_init_system: Task: 'specialized_init_system' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:01.587851134 [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:26] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:26] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [sig_term_handled] [2025-07-10 12:06:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.Task.task_runner.sig_term_handled: Starting test [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:26] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:26] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:06:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.pods_by_resource_labels: Creating list of pods by resource: Deployment/coredns-coredns labels [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:27] DEBUG -- CNTI-KubectlClient.Get.pods_by_labels: Creating list of pods that have labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:06:27] INFO -- CNTI-KubectlClient.Get.pods_by_labels: Matched 1 pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:27] INFO -- CNTI-KubectlClient.wait.wait_for_resource_availability: Waiting for pod/coredns-coredns-56898dd654-2js9x to be available [2025-07-10 12:06:27] INFO -- CNTI-KubectlClient.wait.wait_for_resource_availability: seconds elapsed while waiting: 0 [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.wait.resource_ready?: Checking if resource pod/coredns-coredns-56898dd654-2js9x is ready [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.pod_status: Get status of pod/coredns-coredns-56898dd654-2js9x* with field selector: [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:30] INFO -- CNTI-KubectlClient.Get.pod_status: 'Ready' pods: coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.nodes_by_pod: Finding nodes with pod/coredns-coredns-56898dd654-2js9x [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes [2025-07-10 12:06:30] INFO -- CNTI-KubectlClient.Get.nodes_by_pod: Nodes with pod/coredns-coredns-56898dd654-2js9x list: v132-worker2 [2025-07-10 12:06:30] INFO -- CNTI: node_pid_by_container_id container_id: containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:30] INFO -- CNTI: parse_container_id container_id: containerd://00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8 [2025-07-10 12:06:30] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:30] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:30] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:30] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:30] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:31] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: time="2025-07-10T12:06:31Z" level=warning msg="Config \"/etc/crictl.yaml\" does not exist, trying next: \"/usr/local/bin/crictl.yaml\"" time="2025-07-10T12:06:31Z" level=warning msg="runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead." [2025-07-10 12:06:31] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "{\n \"info\": {\n \"config\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.78.210\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.78.210:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n }\n ],\n \"image\": {\n \"image\": \"sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899\",\n \"user_specified_image\": \"coredns/coredns:1.8.0\"\n },\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_limit_in_bytes\": 134217728,\n \"memory_swap_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997\n },\n \"security_context\": {\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespace_options\": {\n \"pid\": 1\n },\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"run_as_user\": {},\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n },\n \"log_path\": \"coredns/0.log\",\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\"\n }\n ]\n },\n \"pid\": 2603188,\n \"removing\": false,\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"runtimeSpec\": {\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"coredns/coredns:1.8.0\",\n \"io.kubernetes.cri.sandbox-id\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"linux\": {\n \"cgroupsPath\": \"kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"path\": \"/proc/2603161/ns/ipc\",\n \"type\": \"ipc\"\n },\n {\n \"path\": \"/proc/2603161/ns/uts\",\n \"type\": \"uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"path\": \"/proc/2603161/ns/net\",\n \"type\": \"network\"\n }\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"resources\": {\n \"cpu\": {\n \"period\": 100000,\n \"quota\": 10000,\n \"shares\": 102\n },\n \"devices\": [\n {\n \"access\": \"rwm\",\n \"allow\": false\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n }\n }\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"proc\",\n \"type\": \"proc\"\n },\n {\n \"destination\": \"/dev\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ],\n \"source\": \"tmpfs\",\n \"type\": \"tmpfs\"\n },\n {\n \"destination\": \"/dev/pts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ],\n \"source\": \"devpts\",\n \"type\": \"devpts\"\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ],\n \"source\": \"mqueue\",\n \"type\": \"mqueue\"\n },\n {\n \"destination\": \"/sys\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ],\n \"source\": \"sysfs\",\n \"type\": \"sysfs\"\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ],\n \"source\": \"cgroup\",\n \"type\": \"cgroup\"\n },\n {\n \"destination\": \"/etc/coredns\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/dev/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ],\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm\",\n \"type\": \"bind\"\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ],\n \"source\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"type\": \"bind\"\n }\n ],\n \"ociVersion\": \"1.2.1\",\n \"process\": {\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"cwd\": \"/\",\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-56898dd654-2js9x\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\"\n ],\n \"oomScoreAdj\": -997,\n \"user\": {\n \"additionalGids\": [\n 0\n ],\n \"gid\": 0,\n \"uid\": 0\n }\n },\n \"root\": {\n \"path\": \"rootfs\"\n }\n },\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"sandboxID\": \"ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279\",\n \"snapshotKey\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"snapshotter\": \"overlayfs\"\n },\n \"status\": {\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"1d16e0ef\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"createdAt\": \"2025-07-10T12:02:19.316789727Z\",\n \"exitCode\": 0,\n \"finishedAt\": \"0001-01-01T00:00:00Z\",\n \"id\": \"00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8\",\n \"image\": {\n \"annotations\": {},\n \"image\": \"docker.io/coredns/coredns:1.8.0\",\n \"runtimeHandler\": \"\",\n \"userSpecifiedImage\": \"\"\n },\n \"imageId\": \"\",\n \"imageRef\": \"docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-56898dd654-2js9x\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"e7a23045-b167-4251-b263-10084835e501\"\n },\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log\",\n \"message\": \"\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"gidMappings\": [],\n \"hostPath\": \"/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"recursiveReadOnly\": false,\n \"selinuxRelabel\": false,\n \"uidMappings\": []\n }\n ],\n \"reason\": \"\",\n \"resources\": {\n \"linux\": {\n \"cpuPeriod\": \"100000\",\n \"cpuQuota\": \"10000\",\n \"cpuShares\": \"102\",\n \"cpusetCpus\": \"\",\n \"cpusetMems\": \"\",\n \"hugepageLimits\": [],\n \"memoryLimitInBytes\": \"134217728\",\n \"memorySwapLimitInBytes\": \"134217728\",\n \"oomScoreAdj\": \"-997\",\n \"unified\": {}\n }\n },\n \"startedAt\": \"2025-07-10T12:02:20.898798426Z\",\n \"state\": \"CONTAINER_RUNNING\",\n \"user\": {\n \"linux\": {\n \"gid\": \"0\",\n \"supplementalGroups\": [\n \"0\"\n ],\n \"uid\": \"0\"\n }\n }\n }\n}\n", error: "time=\"2025-07-10T12:06:31Z\" level=warning msg=\"Config \\\"/etc/crictl.yaml\\\" does not exist, trying next: \\\"/usr/local/bin/crictl.yaml\\\"\"\ntime=\"2025-07-10T12:06:31Z\" level=warning msg=\"runtime connect using default endpoints: [unix:///run/containerd/containerd.sock unix:///run/crio/crio.sock unix:///var/run/cri-dockerd.sock]. As the default settings are now deprecated, you should set the endpoint instead.\"\n"} [2025-07-10 12:06:31] DEBUG -- CNTI: node_pid_by_container_id inspect: { "info": { "config": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.78.210" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.78.210" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.78.210:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" } ], "image": { "image": "sha256:296a6d5035e2d6919249e02709a488d680ddca91357602bd65e605eac967b899", "user_specified_image": "coredns/coredns:1.8.0" }, "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_limit_in_bytes": 134217728, "memory_swap_limit_in_bytes": 134217728, "oom_score_adj": -997 }, "security_context": { "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespace_options": { "pid": 1 }, "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "run_as_user": {}, "seccomp": { "profile_type": 1 } } }, "log_path": "coredns/0.log", "metadata": { "name": "coredns" }, "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639" } ] }, "pid": 2603188, "removing": false, "runtimeOptions": { "systemd_cgroup": true }, "runtimeSpec": { "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "coredns/coredns:1.8.0", "io.kubernetes.cri.sandbox-id": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "io.kubernetes.cri.sandbox-name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "e7a23045-b167-4251-b263-10084835e501" }, "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "linux": { "cgroupsPath": "kubelet-kubepods-pode7a23045_b167_4251_b263_10084835e501.slice:cri-containerd:00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "namespaces": [ { "type": "pid" }, { "path": "/proc/2603161/ns/ipc", "type": "ipc" }, { "path": "/proc/2603161/ns/uts", "type": "uts" }, { "type": "mount" }, { "path": "/proc/2603161/ns/net", "type": "network" } ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "resources": { "cpu": { "period": 100000, "quota": 10000, "shares": 102 }, "devices": [ { "access": "rwm", "allow": false } ], "memory": { "limit": 134217728, "swap": 134217728 } } }, "mounts": [ { "destination": "/proc", "options": [ "nosuid", "noexec", "nodev" ], "source": "proc", "type": "proc" }, { "destination": "/dev", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ], "source": "tmpfs", "type": "tmpfs" }, { "destination": "/dev/pts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ], "source": "devpts", "type": "devpts" }, { "destination": "/dev/mqueue", "options": [ "nosuid", "noexec", "nodev" ], "source": "mqueue", "type": "mqueue" }, { "destination": "/sys", "options": [ "nosuid", "noexec", "nodev", "ro" ], "source": "sysfs", "type": "sysfs" }, { "destination": "/sys/fs/cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ], "source": "cgroup", "type": "cgroup" }, { "destination": "/etc/coredns", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "type": "bind" }, { "destination": "/etc/hosts", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "type": "bind" }, { "destination": "/dev/termination-log", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "type": "bind" }, { "destination": "/etc/hostname", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/hostname", "type": "bind" }, { "destination": "/etc/resolv.conf", "options": [ "rbind", "rprivate", "rw" ], "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/resolv.conf", "type": "bind" }, { "destination": "/dev/shm", "options": [ "rbind", "rprivate", "rw" ], "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279/shm", "type": "bind" }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "options": [ "rbind", "rprivate", "ro" ], "source": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "type": "bind" } ], "ociVersion": "1.2.1", "process": { "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "cwd": "/", "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-56898dd654-2js9x", "KUBERNETES_PORT=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PORT=443", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_SERVICE_HOST=10.96.0.1", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.78.210", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.78.210", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.78.210:53", "COREDNS_COREDNS_PORT_53_UDP_PORT=53" ], "oomScoreAdj": -997, "user": { "additionalGids": [ 0 ], "gid": 0, "uid": 0 } }, "root": { "path": "rootfs" } }, "runtimeType": "io.containerd.runc.v2", "sandboxID": "ac220fe428b1cf07d73c5c53fdec4ec5bff553ea1e4620940c98ddb5dd883279", "snapshotKey": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "snapshotter": "overlayfs" }, "status": { "annotations": { "io.kubernetes.container.hash": "1d16e0ef", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "createdAt": "2025-07-10T12:02:19.316789727Z", "exitCode": 0, "finishedAt": "0001-01-01T00:00:00Z", "id": "00aaad048b7ef534acdc24172e157919cd539c2fa54084853b5324f8fb222bf8", "image": { "annotations": {}, "image": "docker.io/coredns/coredns:1.8.0", "runtimeHandler": "", "userSpecifiedImage": "" }, "imageId": "", "imageRef": "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-56898dd654-2js9x", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "e7a23045-b167-4251-b263-10084835e501" }, "logPath": "/var/log/pods/cnf-default_coredns-coredns-56898dd654-2js9x_e7a23045-b167-4251-b263-10084835e501/coredns/0.log", "message": "", "metadata": { "attempt": 0, "name": "coredns" }, "mounts": [ { "containerPath": "/etc/coredns", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/volumes/kubernetes.io~projected/kube-api-access-qhngk", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/etc/hosts", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] }, { "containerPath": "/dev/termination-log", "gidMappings": [], "hostPath": "/var/lib/kubelet/pods/e7a23045-b167-4251-b263-10084835e501/containers/coredns/3780d639", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "recursiveReadOnly": false, "selinuxRelabel": false, "uidMappings": [] } ], "reason": "", "resources": { "linux": { "cpuPeriod": "100000", "cpuQuota": "10000", "cpuShares": "102", "cpusetCpus": "", "cpusetMems": "", "hugepageLimits": [], "memoryLimitInBytes": "134217728", "memorySwapLimitInBytes": "134217728", "oomScoreAdj": "-997", "unified": {} } }, "startedAt": "2025-07-10T12:02:20.898798426Z", "state": "CONTAINER_RUNNING", "user": { "linux": { "gid": "0", "supplementalGroups": [ "0" ], "uid": "0" } } } } [2025-07-10 12:06:31] INFO -- CNTI: node_pid_by_container_id pid: 2603188 [2025-07-10 12:06:31] INFO -- CNTI: pids [2025-07-10 12:06:31] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:31] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:31] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:31] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:31] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "1\n162\n1760\n178\n2601721\n2601744\n2601770\n2602657\n2602681\n2602708\n2603137\n2603161\n2603188\n2603858\n2603869\n2603910\n2603917\n2603964\n2603972\n2604925\n310\n402\n407\n453\n460\n515\n702\n810\n835\n866\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} [2025-07-10 12:06:31] INFO -- CNTI: pids ls_proc: {status: Process::Status[0], output: "1\n162\n1760\n178\n2601721\n2601744\n2601770\n2602657\n2602681\n2602708\n2603137\n2603161\n2603188\n2603858\n2603869\n2603910\n2603917\n2603964\n2603972\n2604925\n310\n402\n407\n453\n460\n515\n702\n810\n835\n866\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} [2025-07-10 12:06:31] DEBUG -- CNTI: parse_ls ls: 1 162 1760 178 2601721 2601744 2601770 2602657 2602681 2602708 2603137 2603161 2603188 2603858 2603869 2603910 2603917 2603964 2603972 2604925 310 402 407 453 460 515 702 810 835 866 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo [2025-07-10 12:06:31] DEBUG -- CNTI: parse_ls parsed: ["1", "162", "1760", "178", "2601721", "2601744", "2601770", "2602657", "2602681", "2602708", "2603137", "2603161", "2603188", "2603858", "2603869", "2603910", "2603917", "2603964", "2603972", "2604925", "310", "402", "407", "453", "460", "515", "702", "810", "835", "866", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] [2025-07-10 12:06:31] DEBUG -- CNTI: pids_from_ls_proc ls: ["1", "162", "1760", "178", "2601721", "2601744", "2601770", "2602657", "2602681", "2602708", "2603137", "2603161", "2603188", "2603858", "2603869", "2603910", "2603917", "2603964", "2603972", "2604925", "310", "402", "407", "453", "460", "515", "702", "810", "835", "866", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] [2025-07-10 12:06:31] DEBUG -- CNTI: pids_from_ls_proc pids: ["1", "162", "1760", "178", "2601721", "2601744", "2601770", "2602657", "2602681", "2602708", "2603137", "2603161", "2603188", "2603858", "2603869", "2603910", "2603917", "2603964", "2603972", "2604925", "310", "402", "407", "453", "460", "515", "702", "810", "835", "866"] [2025-07-10 12:06:31] INFO -- CNTI: all_statuses_by_pids [2025-07-10 12:06:31] INFO -- CNTI: all_statuses_by_pids pid: 1 [2025-07-10 12:06:31] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:31] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:31] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:31] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:31] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35836 kB\nVmSize:\t 35836 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 26984 kB\nVmRSS:\t 26984 kB\nRssAnon:\t 18544 kB\nRssFile:\t 8440 kB\nRssShmem:\t 0 kB\nVmData:\t 17828 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t681500\nnonvoluntary_ctxt_switches:\t31235\n", error: ""} [2025-07-10 12:06:31] INFO -- CNTI: all_statuses_by_pids pid: 162 [2025-07-10 12:06:31] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:31] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:32] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:32] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t563931\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 439148 kB\nVmSize:\t 290980 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 292424 kB\nVmRSS:\t 170688 kB\nRssAnon:\t 1124 kB\nRssFile:\t 6744 kB\nRssShmem:\t 162820 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 468 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t499859\nnonvoluntary_ctxt_switches:\t1275\n", error: ""} [2025-07-10 12:06:32] INFO -- CNTI: all_statuses_by_pids pid: 1760 [2025-07-10 12:06:32] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:32] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:32] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:32] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:32] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1760\nNgid:\t0\nPid:\t1760\nPPid:\t866\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1760\t888\nNSpid:\t1760\t888\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:32] INFO -- CNTI: all_statuses_by_pids pid: 178 [2025-07-10 12:06:32] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:32] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:32] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:32] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:32] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:33] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t0 \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 9412488 kB\nVmSize:\t 9043344 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 164520 kB\nVmRSS:\t 90784 kB\nRssAnon:\t 63888 kB\nRssFile:\t 26896 kB\nRssShmem:\t 0 kB\nVmData:\t 723532 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1288 kB\nVmSwap:\t 496 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t63\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t2\n", error: ""} [2025-07-10 12:06:33] INFO -- CNTI: all_statuses_by_pids pid: 2601721 [2025-07-10 12:06:33] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:33] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:33] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:33] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:33] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601721\nNgid:\t0\nPid:\t2601721\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601721\nNSpid:\t2601721\nNSpgid:\t2601721\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11164 kB\nVmRSS:\t 11012 kB\nRssAnon:\t 4024 kB\nRssFile:\t 6988 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t47\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:33] INFO -- CNTI: all_statuses_by_pids pid: 2601744 [2025-07-10 12:06:33] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:33] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:33] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:33] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:33] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601744\nNgid:\t0\nPid:\t2601744\nPPid:\t2601721\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2601744\nNSpid:\t2601744\nNSpgid:\t2601744\nNSsid:\t2601744\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-07-10 12:06:33] INFO -- CNTI: all_statuses_by_pids pid: 2601770 [2025-07-10 12:06:33] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:33] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:34] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601770\nNgid:\t0\nPid:\t2601770\nPPid:\t2601721\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601770\nNSpid:\t2601770\nNSpgid:\t2601770\nNSsid:\t2601770\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 912 kB\nVmRSS:\t 912 kB\nRssAnon:\t 88 kB\nRssFile:\t 824 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t43\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-07-10 12:06:34] INFO -- CNTI: all_statuses_by_pids pid: 2602657 [2025-07-10 12:06:34] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:34] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:34] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602657\nNgid:\t0\nPid:\t2602657\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2602657\nNSpid:\t2602657\nNSpgid:\t2602657\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11076 kB\nVmRSS:\t 10740 kB\nRssAnon:\t 3432 kB\nRssFile:\t 7308 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:34] INFO -- CNTI: all_statuses_by_pids pid: 2602681 [2025-07-10 12:06:34] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:34] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:34] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:34] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:34] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:35] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602681\nNgid:\t0\nPid:\t2602681\nPPid:\t2602657\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2602681\t1\nNSpid:\t2602681\t1\nNSpgid:\t2602681\t1\nNSsid:\t2602681\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-07-10 12:06:35] INFO -- CNTI: all_statuses_by_pids pid: 2602708 [2025-07-10 12:06:35] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:35] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:35] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:35] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:35] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602708\nNgid:\t0\nPid:\t2602708\nPPid:\t2602657\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t2602708\t1\nNSpid:\t2602708\t1\nNSpgid:\t2602708\t1\nNSsid:\t2602708\t1\nVmPeak:\t 1262188 kB\nVmSize:\t 1262188 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38848 kB\nVmRSS:\t 38848 kB\nRssAnon:\t 15296 kB\nRssFile:\t 23552 kB\nRssShmem:\t 0 kB\nVmData:\t 67012 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t36\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t825\nnonvoluntary_ctxt_switches:\t16\n", error: ""} [2025-07-10 12:06:35] INFO -- CNTI: all_statuses_by_pids pid: 2603137 [2025-07-10 12:06:35] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:35] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:35] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:35] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:35] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603137\nNgid:\t0\nPid:\t2603137\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603137\nNSpid:\t2603137\nNSpgid:\t2603137\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11324 kB\nVmRSS:\t 10644 kB\nRssAnon:\t 3208 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44856 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:35] INFO -- CNTI: all_statuses_by_pids pid: 2603161 [2025-07-10 12:06:35] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:35] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:36] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:36] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603161\nNgid:\t0\nPid:\t2603161\nPPid:\t2603137\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603161\t1\nNSpid:\t2603161\t1\nNSpgid:\t2603161\t1\nNSsid:\t2603161\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t11\n", error: ""} [2025-07-10 12:06:36] INFO -- CNTI: all_statuses_by_pids pid: 2603188 [2025-07-10 12:06:36] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:36] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:36] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:36] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:36] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n", error: ""} [2025-07-10 12:06:36] INFO -- CNTI: all_statuses_by_pids pid: 2603858 [2025-07-10 12:06:36] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:36] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:36] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:36] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:36] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603858\nNgid:\t0\nPid:\t2603858\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603858\nNSpid:\t2603858\nNSpgid:\t2603858\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10068 kB\nVmRSS:\t 9836 kB\nRssAnon:\t 3180 kB\nRssFile:\t 6656 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t11/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:37] INFO -- CNTI: all_statuses_by_pids pid: 2603869 [2025-07-10 12:06:37] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603869\nNgid:\t0\nPid:\t2603869\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603869\nNSpid:\t2603869\nNSpgid:\t2603869\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10328 kB\nVmRSS:\t 10144 kB\nRssAnon:\t 3232 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:37] INFO -- CNTI: all_statuses_by_pids pid: 2603910 [2025-07-10 12:06:37] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603910\nNgid:\t0\nPid:\t2603910\nPPid:\t2603858\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603910\t1\nNSpid:\t2603910\t1\nNSpgid:\t2603910\t1\nNSsid:\t2603910\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t31\nnonvoluntary_ctxt_switches:\t10\n", error: ""} [2025-07-10 12:06:37] INFO -- CNTI: all_statuses_by_pids pid: 2603917 [2025-07-10 12:06:37] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:37] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:37] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:37] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:38] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603917\nNgid:\t0\nPid:\t2603917\nPPid:\t2603869\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603917\t1\nNSpid:\t2603917\t1\nNSpgid:\t2603917\t1\nNSsid:\t2603917\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-07-10 12:06:38] INFO -- CNTI: all_statuses_by_pids pid: 2603964 [2025-07-10 12:06:38] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:38] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:38] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:38] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:38] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:38] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603964\nNgid:\t0\nPid:\t2603964\nPPid:\t2603858\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603964\t1\nNSpid:\t2603964\t1\nNSpgid:\t2603964\t1\nNSsid:\t2603964\t1\nVmPeak:\t 1315792 kB\nVmSize:\t 1315792 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 101356 kB\nVmRSS:\t 95012 kB\nRssAnon:\t 43772 kB\nRssFile:\t 51240 kB\nRssShmem:\t 0 kB\nVmData:\t 107348 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 356 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t680\nnonvoluntary_ctxt_switches:\t19\n", error: ""} [2025-07-10 12:06:38] INFO -- CNTI: all_statuses_by_pids pid: 2603972 [2025-07-10 12:06:38] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:38] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:38] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:38] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:38] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:38] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:39] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603972\nNgid:\t0\nPid:\t2603972\nPPid:\t2603869\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603972\t1\nNSpid:\t2603972\t1\nNSpgid:\t2603972\t1\nNSsid:\t2603972\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 85968 kB\nVmRSS:\t 85968 kB\nRssAnon:\t 35176 kB\nRssFile:\t 50792 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t703\nnonvoluntary_ctxt_switches:\t9\n", error: ""} [2025-07-10 12:06:39] INFO -- CNTI: all_statuses_by_pids pid: 2604925 [2025-07-10 12:06:39] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:39] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:39] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:39] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:39] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:39] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:39] WARN -- CNTI-KubectlClient.Utils.exec.cmd: stderr: cat: /proc/2604925/status: No such file or directory command terminated with exit code 1 [2025-07-10 12:06:39] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[1], output: "", error: "cat: /proc/2604925/status: No such file or directory\ncommand terminated with exit code 1\n"} [2025-07-10 12:06:39] INFO -- CNTI: all_statuses_by_pids pid: 310 [2025-07-10 12:06:39] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:39] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:39] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:39] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:39] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:39] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t310\nNgid:\t568149\nPid:\t310\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t310\nNSpid:\t310\nNSpgid:\t310\nNSsid:\t310\nVmPeak:\t 8326140 kB\nVmSize:\t 8326140 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126124 kB\nVmRSS:\t 115300 kB\nRssAnon:\t 81856 kB\nRssFile:\t 33444 kB\nRssShmem:\t 0 kB\nVmData:\t 940556 kB\nVmStk:\t 132 kB\nVmExe:\t 35224 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1268 kB\nVmSwap:\t 484 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t95\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5758907\nnonvoluntary_ctxt_switches:\t6235\n", error: ""} [2025-07-10 12:06:40] INFO -- CNTI: all_statuses_by_pids pid: 402 [2025-07-10 12:06:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t402\nNgid:\t0\nPid:\t402\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t402\nNSpid:\t402\nNSpgid:\t402\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10988 kB\nVmRSS:\t 10472 kB\nRssAnon:\t 3036 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 340 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:40] INFO -- CNTI: all_statuses_by_pids pid: 407 [2025-07-10 12:06:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t407\nNgid:\t0\nPid:\t407\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t407\nNSpid:\t407\nNSpgid:\t407\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10472 kB\nVmRSS:\t 10292 kB\nRssAnon:\t 3380 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 36 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:40] INFO -- CNTI: all_statuses_by_pids pid: 453 [2025-07-10 12:06:40] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:40] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:40] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:40] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:41] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t453\nNgid:\t0\nPid:\t453\nPPid:\t407\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t453\t1\nNSpid:\t453\t1\nNSpgid:\t453\t1\nNSsid:\t453\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t27\nnonvoluntary_ctxt_switches:\t6\n", error: ""} [2025-07-10 12:06:41] INFO -- CNTI: all_statuses_by_pids pid: 460 [2025-07-10 12:06:41] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:41] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:41] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:41] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:41] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t460\nNgid:\t0\nPid:\t460\nPPid:\t402\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t460\t1\nNSpid:\t460\t1\nNSpgid:\t460\t1\nNSsid:\t460\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t11\n", error: ""} [2025-07-10 12:06:41] INFO -- CNTI: all_statuses_by_pids pid: 515 [2025-07-10 12:06:41] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:41] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:41] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:41] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:41] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t515\nNgid:\t568923\nPid:\t515\nPPid:\t407\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t515\t1\nNSpid:\t515\t1\nNSpgid:\t515\t1\nNSsid:\t515\t1\nVmPeak:\t 1299708 kB\nVmSize:\t 1299708 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56944 kB\nVmRSS:\t 34364 kB\nRssAnon:\t 19532 kB\nRssFile:\t 14832 kB\nRssShmem:\t 0 kB\nVmData:\t 74880 kB\nVmStk:\t 132 kB\nVmExe:\t 30360 kB\nVmLib:\t 8 kB\nVmPTE:\t 280 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t34\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t211772\nnonvoluntary_ctxt_switches:\t607\n", error: ""} [2025-07-10 12:06:41] INFO -- CNTI: all_statuses_by_pids pid: 702 [2025-07-10 12:06:41] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:41] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:42] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:42] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t702\nNgid:\t1270145\nPid:\t702\nPPid:\t402\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t702\t1\nNSpid:\t702\t1\nNSpgid:\t702\t1\nNSsid:\t702\t1\nVmPeak:\t 1285704 kB\nVmSize:\t 1285704 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 48900 kB\nVmRSS:\t 26680 kB\nRssAnon:\t 14540 kB\nRssFile:\t 12140 kB\nRssShmem:\t 0 kB\nVmData:\t 64144 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 268 kB\nVmSwap:\t 4 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t233248\nnonvoluntary_ctxt_switches:\t7100\n", error: ""} [2025-07-10 12:06:42] INFO -- CNTI: all_statuses_by_pids pid: 810 [2025-07-10 12:06:42] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:42] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:42] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:42] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t810\nNgid:\t0\nPid:\t810\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t810\nNSpid:\t810\nNSpgid:\t810\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10280 kB\nVmRSS:\t 9868 kB\nRssAnon:\t 3032 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} [2025-07-10 12:06:42] INFO -- CNTI: all_statuses_by_pids pid: 835 [2025-07-10 12:06:42] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:42] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:42] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:42] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:42] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:43] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t835\nNgid:\t0\nPid:\t835\nPPid:\t810\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t835\t1\nNSpid:\t835\t1\nNSpgid:\t835\t1\nNSsid:\t835\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t8\n", error: ""} [2025-07-10 12:06:43] INFO -- CNTI: all_statuses_by_pids pid: 866 [2025-07-10 12:06:43] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:43] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:43] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:43] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:43] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t866\nNgid:\t0\nPid:\t866\nPPid:\t810\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t866\t1\nNSpid:\t866\t1\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t915\nnonvoluntary_ctxt_switches:\t7\n", error: ""} [2025-07-10 12:06:43] DEBUG -- CNTI: proc process_statuses_by_node: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35836 kB\nVmSize:\t 35836 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 26984 kB\nVmRSS:\t 26984 kB\nRssAnon:\t 18544 kB\nRssFile:\t 8440 kB\nRssShmem:\t 0 kB\nVmData:\t 17828 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t681500\nnonvoluntary_ctxt_switches:\t31235\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t563931\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 439148 kB\nVmSize:\t 290980 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 292424 kB\nVmRSS:\t 170688 kB\nRssAnon:\t 1124 kB\nRssFile:\t 6744 kB\nRssShmem:\t 162820 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 468 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t499859\nnonvoluntary_ctxt_switches:\t1275\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1760\nNgid:\t0\nPid:\t1760\nPPid:\t866\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1760\t888\nNSpid:\t1760\t888\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t0 \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 9412488 kB\nVmSize:\t 9043344 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 164520 kB\nVmRSS:\t 90784 kB\nRssAnon:\t 63888 kB\nRssFile:\t 26896 kB\nRssShmem:\t 0 kB\nVmData:\t 723532 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1288 kB\nVmSwap:\t 496 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t63\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t2\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601721\nNgid:\t0\nPid:\t2601721\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601721\nNSpid:\t2601721\nNSpgid:\t2601721\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11164 kB\nVmRSS:\t 11012 kB\nRssAnon:\t 4024 kB\nRssFile:\t 6988 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t47\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601744\nNgid:\t0\nPid:\t2601744\nPPid:\t2601721\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2601744\nNSpid:\t2601744\nNSpgid:\t2601744\nNSsid:\t2601744\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601770\nNgid:\t0\nPid:\t2601770\nPPid:\t2601721\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601770\nNSpid:\t2601770\nNSpgid:\t2601770\nNSsid:\t2601770\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 912 kB\nVmRSS:\t 912 kB\nRssAnon:\t 88 kB\nRssFile:\t 824 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t43\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602657\nNgid:\t0\nPid:\t2602657\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2602657\nNSpid:\t2602657\nNSpgid:\t2602657\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11076 kB\nVmRSS:\t 10740 kB\nRssAnon:\t 3432 kB\nRssFile:\t 7308 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602681\nNgid:\t0\nPid:\t2602681\nPPid:\t2602657\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2602681\t1\nNSpid:\t2602681\t1\nNSpgid:\t2602681\t1\nNSsid:\t2602681\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602708\nNgid:\t0\nPid:\t2602708\nPPid:\t2602657\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t2602708\t1\nNSpid:\t2602708\t1\nNSpgid:\t2602708\t1\nNSsid:\t2602708\t1\nVmPeak:\t 1262188 kB\nVmSize:\t 1262188 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38848 kB\nVmRSS:\t 38848 kB\nRssAnon:\t 15296 kB\nRssFile:\t 23552 kB\nRssShmem:\t 0 kB\nVmData:\t 67012 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t36\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t825\nnonvoluntary_ctxt_switches:\t16\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603137\nNgid:\t0\nPid:\t2603137\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603137\nNSpid:\t2603137\nNSpgid:\t2603137\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11324 kB\nVmRSS:\t 10644 kB\nRssAnon:\t 3208 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44856 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603161\nNgid:\t0\nPid:\t2603161\nPPid:\t2603137\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603161\t1\nNSpid:\t2603161\t1\nNSpgid:\t2603161\t1\nNSsid:\t2603161\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603858\nNgid:\t0\nPid:\t2603858\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603858\nNSpid:\t2603858\nNSpgid:\t2603858\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10068 kB\nVmRSS:\t 9836 kB\nRssAnon:\t 3180 kB\nRssFile:\t 6656 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t11/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603869\nNgid:\t0\nPid:\t2603869\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603869\nNSpid:\t2603869\nNSpgid:\t2603869\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10328 kB\nVmRSS:\t 10144 kB\nRssAnon:\t 3232 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603910\nNgid:\t0\nPid:\t2603910\nPPid:\t2603858\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603910\t1\nNSpid:\t2603910\t1\nNSpgid:\t2603910\t1\nNSsid:\t2603910\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t31\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603917\nNgid:\t0\nPid:\t2603917\nPPid:\t2603869\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603917\t1\nNSpid:\t2603917\t1\nNSpgid:\t2603917\t1\nNSsid:\t2603917\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603964\nNgid:\t0\nPid:\t2603964\nPPid:\t2603858\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603964\t1\nNSpid:\t2603964\t1\nNSpgid:\t2603964\t1\nNSsid:\t2603964\t1\nVmPeak:\t 1315792 kB\nVmSize:\t 1315792 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 101356 kB\nVmRSS:\t 95012 kB\nRssAnon:\t 43772 kB\nRssFile:\t 51240 kB\nRssShmem:\t 0 kB\nVmData:\t 107348 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 356 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t680\nnonvoluntary_ctxt_switches:\t19\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603972\nNgid:\t0\nPid:\t2603972\nPPid:\t2603869\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603972\t1\nNSpid:\t2603972\t1\nNSpgid:\t2603972\t1\nNSsid:\t2603972\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 85968 kB\nVmRSS:\t 85968 kB\nRssAnon:\t 35176 kB\nRssFile:\t 50792 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t703\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t310\nNgid:\t568149\nPid:\t310\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t310\nNSpid:\t310\nNSpgid:\t310\nNSsid:\t310\nVmPeak:\t 8326140 kB\nVmSize:\t 8326140 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126124 kB\nVmRSS:\t 115300 kB\nRssAnon:\t 81856 kB\nRssFile:\t 33444 kB\nRssShmem:\t 0 kB\nVmData:\t 940556 kB\nVmStk:\t 132 kB\nVmExe:\t 35224 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1268 kB\nVmSwap:\t 484 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t95\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5758907\nnonvoluntary_ctxt_switches:\t6235\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t402\nNgid:\t0\nPid:\t402\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t402\nNSpid:\t402\nNSpgid:\t402\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10988 kB\nVmRSS:\t 10472 kB\nRssAnon:\t 3036 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 340 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t407\nNgid:\t0\nPid:\t407\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t407\nNSpid:\t407\nNSpgid:\t407\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10472 kB\nVmRSS:\t 10292 kB\nRssAnon:\t 3380 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 36 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t453\nNgid:\t0\nPid:\t453\nPPid:\t407\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t453\t1\nNSpid:\t453\t1\nNSpgid:\t453\t1\nNSsid:\t453\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t27\nnonvoluntary_ctxt_switches:\t6\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t460\nNgid:\t0\nPid:\t460\nPPid:\t402\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t460\t1\nNSpid:\t460\t1\nNSpgid:\t460\t1\nNSsid:\t460\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t515\nNgid:\t568923\nPid:\t515\nPPid:\t407\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t515\t1\nNSpid:\t515\t1\nNSpgid:\t515\t1\nNSsid:\t515\t1\nVmPeak:\t 1299708 kB\nVmSize:\t 1299708 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56944 kB\nVmRSS:\t 34364 kB\nRssAnon:\t 19532 kB\nRssFile:\t 14832 kB\nRssShmem:\t 0 kB\nVmData:\t 74880 kB\nVmStk:\t 132 kB\nVmExe:\t 30360 kB\nVmLib:\t 8 kB\nVmPTE:\t 280 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t34\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t211772\nnonvoluntary_ctxt_switches:\t607\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t702\nNgid:\t1270145\nPid:\t702\nPPid:\t402\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t702\t1\nNSpid:\t702\t1\nNSpgid:\t702\t1\nNSsid:\t702\t1\nVmPeak:\t 1285704 kB\nVmSize:\t 1285704 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 48900 kB\nVmRSS:\t 26680 kB\nRssAnon:\t 14540 kB\nRssFile:\t 12140 kB\nRssShmem:\t 0 kB\nVmData:\t 64144 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 268 kB\nVmSwap:\t 4 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t233248\nnonvoluntary_ctxt_switches:\t7100\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t810\nNgid:\t0\nPid:\t810\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t810\nNSpid:\t810\nNSpgid:\t810\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10280 kB\nVmRSS:\t 9868 kB\nRssAnon:\t 3032 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t835\nNgid:\t0\nPid:\t835\nPPid:\t810\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t835\t1\nNSpid:\t835\t1\nNSpgid:\t835\t1\nNSsid:\t835\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t866\nNgid:\t0\nPid:\t866\nPPid:\t810\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t866\t1\nNSpid:\t866\t1\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t915\nnonvoluntary_ctxt_switches:\t7\n"] [2025-07-10 12:06:43] INFO -- CNTI-proctree_by_pid: proctree_by_pid potential_parent_pid: 2603188 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: proc_statuses: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35836 kB\nVmSize:\t 35836 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 26984 kB\nVmRSS:\t 26984 kB\nRssAnon:\t 18544 kB\nRssFile:\t 8440 kB\nRssShmem:\t 0 kB\nVmData:\t 17828 kB\nVmStk:\t 132 kB\nVmExe:\t 40 kB\nVmLib:\t 10688 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t681500\nnonvoluntary_ctxt_switches:\t31235\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t563931\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 439148 kB\nVmSize:\t 290980 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 292424 kB\nVmRSS:\t 170688 kB\nRssAnon:\t 1124 kB\nRssFile:\t 6744 kB\nRssShmem:\t 162820 kB\nVmData:\t 8964 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9736 kB\nVmPTE:\t 468 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t499859\nnonvoluntary_ctxt_switches:\t1275\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1760\nNgid:\t0\nPid:\t1760\nPPid:\t866\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1760\t888\nNSpid:\t1760\t888\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t0 \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 9412488 kB\nVmSize:\t 9043344 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 164520 kB\nVmRSS:\t 90784 kB\nRssAnon:\t 63888 kB\nRssFile:\t 26896 kB\nRssShmem:\t 0 kB\nVmData:\t 723532 kB\nVmStk:\t 132 kB\nVmExe:\t 18236 kB\nVmLib:\t 1524 kB\nVmPTE:\t 1288 kB\nVmSwap:\t 496 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t63\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t126\nnonvoluntary_ctxt_switches:\t2\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601721\nNgid:\t0\nPid:\t2601721\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601721\nNSpid:\t2601721\nNSpgid:\t2601721\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11164 kB\nVmRSS:\t 11012 kB\nRssAnon:\t 4024 kB\nRssFile:\t 6988 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t47\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601744\nNgid:\t0\nPid:\t2601744\nPPid:\t2601721\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2601744\nNSpid:\t2601744\nNSpgid:\t2601744\nNSsid:\t2601744\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2601770\nNgid:\t0\nPid:\t2601770\nPPid:\t2601721\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2601770\nNSpid:\t2601770\nNSpgid:\t2601770\nNSsid:\t2601770\nVmPeak:\t 2488 kB\nVmSize:\t 2488 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 912 kB\nVmRSS:\t 912 kB\nRssAnon:\t 88 kB\nRssFile:\t 824 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1524 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t43\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602657\nNgid:\t0\nPid:\t2602657\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2602657\nNSpid:\t2602657\nNSpgid:\t2602657\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11076 kB\nVmRSS:\t 10740 kB\nRssAnon:\t 3432 kB\nRssFile:\t 7308 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602681\nNgid:\t0\nPid:\t2602681\nPPid:\t2602657\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2602681\t1\nNSpid:\t2602681\t1\nNSpgid:\t2602681\t1\nNSsid:\t2602681\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2602708\nNgid:\t0\nPid:\t2602708\nPPid:\t2602657\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t2602708\t1\nNSpid:\t2602708\t1\nNSpgid:\t2602708\t1\nNSsid:\t2602708\t1\nVmPeak:\t 1262188 kB\nVmSize:\t 1262188 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38848 kB\nVmRSS:\t 38848 kB\nRssAnon:\t 15296 kB\nRssFile:\t 23552 kB\nRssShmem:\t 0 kB\nVmData:\t 67012 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t36\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t825\nnonvoluntary_ctxt_switches:\t16\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603137\nNgid:\t0\nPid:\t2603137\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603137\nNSpid:\t2603137\nNSpgid:\t2603137\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 11324 kB\nVmRSS:\t 10644 kB\nRssAnon:\t 3208 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 44856 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t11\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603161\nNgid:\t0\nPid:\t2603161\nPPid:\t2603137\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603161\t1\nNSpid:\t2603161\t1\nNSpgid:\t2603161\t1\nNSsid:\t2603161\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t25\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603188\nNgid:\t0\nPid:\t2603188\nPPid:\t2603137\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603188\t1\nNSpid:\t2603188\t1\nNSpgid:\t2603188\t1\nNSsid:\t2603188\t1\nVmPeak:\t 748824 kB\nVmSize:\t 748824 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41832 kB\nVmRSS:\t 41832 kB\nRssAnon:\t 12792 kB\nRssFile:\t 29040 kB\nRssShmem:\t 0 kB\nVmData:\t 108936 kB\nVmStk:\t 132 kB\nVmExe:\t 22072 kB\nVmLib:\t 8 kB\nVmPTE:\t 204 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1543\nnonvoluntary_ctxt_switches:\t15\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603858\nNgid:\t0\nPid:\t2603858\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603858\nNSpid:\t2603858\nNSpgid:\t2603858\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10068 kB\nVmRSS:\t 9836 kB\nRssAnon:\t 3180 kB\nRssFile:\t 6656 kB\nRssShmem:\t 0 kB\nVmData:\t 45112 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t11/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603869\nNgid:\t0\nPid:\t2603869\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t2603869\nNSpid:\t2603869\nNSpgid:\t2603869\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10328 kB\nVmRSS:\t 10144 kB\nRssAnon:\t 3232 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 108 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t7\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603910\nNgid:\t0\nPid:\t2603910\nPPid:\t2603858\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603910\t1\nNSpid:\t2603910\t1\nNSpgid:\t2603910\t1\nNSsid:\t2603910\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t31\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603917\nNgid:\t0\nPid:\t2603917\nPPid:\t2603869\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t2603917\t1\nNSpid:\t2603917\t1\nNSpgid:\t2603917\t1\nNSsid:\t2603917\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603964\nNgid:\t0\nPid:\t2603964\nPPid:\t2603858\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603964\t1\nNSpid:\t2603964\t1\nNSpgid:\t2603964\t1\nNSsid:\t2603964\t1\nVmPeak:\t 1315792 kB\nVmSize:\t 1315792 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 101356 kB\nVmRSS:\t 95012 kB\nRssAnon:\t 43772 kB\nRssFile:\t 51240 kB\nRssShmem:\t 0 kB\nVmData:\t 107348 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 356 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t680\nnonvoluntary_ctxt_switches:\t19\n", "Name:\tmanager\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t2603972\nNgid:\t0\nPid:\t2603972\nPPid:\t2603869\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t999\t999\t999\t999\nFDSize:\t64\nGroups:\t999 \nNStgid:\t2603972\t1\nNSpid:\t2603972\t1\nNSpgid:\t2603972\t1\nNSsid:\t2603972\t1\nVmPeak:\t 1308944 kB\nVmSize:\t 1308944 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 85968 kB\nVmRSS:\t 85968 kB\nRssAnon:\t 35176 kB\nRssFile:\t 50792 kB\nRssShmem:\t 0 kB\nVmData:\t 84116 kB\nVmStk:\t 132 kB\nVmExe:\t 32292 kB\nVmLib:\t 8 kB\nVmPTE:\t 316 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t43\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t0000000000000000\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t703\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t310\nNgid:\t568149\nPid:\t310\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t0 \nNStgid:\t310\nNSpid:\t310\nNSpgid:\t310\nNSsid:\t310\nVmPeak:\t 8326140 kB\nVmSize:\t 8326140 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126124 kB\nVmRSS:\t 115300 kB\nRssAnon:\t 81856 kB\nRssFile:\t 33444 kB\nRssShmem:\t 0 kB\nVmData:\t 940556 kB\nVmStk:\t 132 kB\nVmExe:\t 35224 kB\nVmLib:\t 1560 kB\nVmPTE:\t 1268 kB\nVmSwap:\t 484 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t95\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5758907\nnonvoluntary_ctxt_switches:\t6235\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t402\nNgid:\t0\nPid:\t402\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t402\nNSpid:\t402\nNSpgid:\t402\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10988 kB\nVmRSS:\t 10472 kB\nRssAnon:\t 3036 kB\nRssFile:\t 7436 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 340 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t407\nNgid:\t0\nPid:\t407\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t407\nNSpid:\t407\nNSpgid:\t407\nNSsid:\t178\nVmPeak:\t 1233804 kB\nVmSize:\t 1233804 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10472 kB\nVmRSS:\t 10292 kB\nRssAnon:\t 3380 kB\nRssFile:\t 6912 kB\nRssShmem:\t 0 kB\nVmData:\t 41016 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 36 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t453\nNgid:\t0\nPid:\t453\nPPid:\t407\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t453\t1\nNSpid:\t453\t1\nNSpgid:\t453\t1\nNSsid:\t453\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t27\nnonvoluntary_ctxt_switches:\t6\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t460\nNgid:\t0\nPid:\t460\nPPid:\t402\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t460\t1\nNSpid:\t460\t1\nNSpgid:\t460\t1\nNSsid:\t460\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t28\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t515\nNgid:\t568923\nPid:\t515\nPPid:\t407\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t515\t1\nNSpid:\t515\t1\nNSpgid:\t515\t1\nNSsid:\t515\t1\nVmPeak:\t 1299708 kB\nVmSize:\t 1299708 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56944 kB\nVmRSS:\t 34364 kB\nRssAnon:\t 19532 kB\nRssFile:\t 14832 kB\nRssShmem:\t 0 kB\nVmData:\t 74880 kB\nVmStk:\t 132 kB\nVmExe:\t 30360 kB\nVmLib:\t 8 kB\nVmPTE:\t 280 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t34\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t211772\nnonvoluntary_ctxt_switches:\t607\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t702\nNgid:\t1270145\nPid:\t702\nPPid:\t402\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t702\t1\nNSpid:\t702\t1\nNSpgid:\t702\t1\nNSsid:\t702\t1\nVmPeak:\t 1285704 kB\nVmSize:\t 1285704 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 48900 kB\nVmRSS:\t 26680 kB\nRssAnon:\t 14540 kB\nRssFile:\t 12140 kB\nRssShmem:\t 0 kB\nVmData:\t 64144 kB\nVmStk:\t 132 kB\nVmExe:\t 25108 kB\nVmLib:\t 8 kB\nVmPTE:\t 268 kB\nVmSwap:\t 4 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t233248\nnonvoluntary_ctxt_switches:\t7100\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t810\nNgid:\t0\nPid:\t810\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t810\nNSpid:\t810\nNSpgid:\t810\nNSsid:\t178\nVmPeak:\t 1233548 kB\nVmSize:\t 1233548 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 10280 kB\nVmRSS:\t 9868 kB\nRssAnon:\t 3032 kB\nRssFile:\t 6836 kB\nRssShmem:\t 0 kB\nVmData:\t 40760 kB\nVmStk:\t 132 kB\nVmExe:\t 3632 kB\nVmLib:\t 8 kB\nVmPTE:\t 104 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t835\nNgid:\t0\nPid:\t835\nPPid:\t810\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t835\t1\nNSpid:\t835\t1\nNSpgid:\t835\t1\nNSsid:\t835\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t866\nNgid:\t0\nPid:\t866\nPPid:\t810\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t866\t1\nNSpid:\t866\t1\nNSpgid:\t866\t1\nNSsid:\t866\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 48 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t000001ffffffffff\nCapEff:\t000001ffffffffff\nCapBnd:\t000001ffffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t915\nnonvoluntary_ctxt_switches:\t7\n"] [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: 0 NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35836 kB VmSize: 35836 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 26984 kB VmRSS: 26984 kB RssAnon: 18544 kB RssFile: 8440 kB RssShmem: 0 kB VmData: 17828 kB VmStk: 132 kB VmExe: 40 kB VmLib: 10688 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 681500 nonvoluntary_ctxt_switches: 31235 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "systemd", "Umask" => "0000", "State" => "S (sleeping)", "Tgid" => "1", "Ngid" => "0", "Pid" => "1", "PPid" => "0", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "0", "NStgid" => "1", "NSpid" => "1", "NSpgid" => "1", "NSsid" => "1", "VmPeak" => "35836 kB", "VmSize" => "35836 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "26984 kB", "VmRSS" => "26984 kB", "RssAnon" => "18544 kB", "RssFile" => "8440 kB", "RssShmem" => "0 kB", "VmData" => "17828 kB", "VmStk" => "132 kB", "VmExe" => "40 kB", "VmLib" => "10688 kB", "VmPTE" => "112 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "7fe3c0fe28014a03", "SigIgn" => "0000000000001000", "SigCgt" => "00000000000004ec", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "681500", "nonvoluntary_ctxt_switches" => "31235"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 563931 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 439148 kB VmSize: 290980 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 292424 kB VmRSS: 170688 kB RssAnon: 1124 kB RssFile: 6744 kB RssShmem: 162820 kB VmData: 8964 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9736 kB VmPTE: 468 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 499859 nonvoluntary_ctxt_switches: 1275 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "systemd-journal", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "162", "Ngid" => "563931", "Pid" => "162", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "162", "NSpid" => "162", "NSpgid" => "162", "NSsid" => "162", "VmPeak" => "439148 kB", "VmSize" => "290980 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "292424 kB", "VmRSS" => "170688 kB", "RssAnon" => "1124 kB", "RssFile" => "6744 kB", "RssShmem" => "162820 kB", "VmData" => "8964 kB", "VmStk" => "132 kB", "VmExe" => "92 kB", "VmLib" => "9736 kB", "VmPTE" => "468 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000400004a02", "SigIgn" => "0000000000001000", "SigCgt" => "0000000100000040", "CapInh" => "0000000000000000", "CapPrm" => "00000025402800cf", "CapEff" => "00000025402800cf", "CapBnd" => "00000025402800cf", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "20", "Speculation_Store_Bypass" => "thread force mitigated", "SpeculationIndirectBranch" => "conditional force disabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "499859", "nonvoluntary_ctxt_switches" => "1275"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1760 Ngid: 0 Pid: 1760 PPid: 866 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1760 888 NSpid: 1760 888 NSpgid: 866 1 NSsid: 866 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "1760", "Ngid" => "0", "Pid" => "1760", "PPid" => "866", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "1760\t888", "NSpid" => "1760\t888", "NSpgid" => "866\t1", "NSsid" => "866\t1", "VmPeak" => "3552 kB", "VmSize" => "1532 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "20 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: 0 NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 9412488 kB VmSize: 9043344 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 164520 kB VmRSS: 90784 kB RssAnon: 63888 kB RssFile: 26896 kB RssShmem: 0 kB VmData: 723532 kB VmStk: 132 kB VmExe: 18236 kB VmLib: 1524 kB VmPTE: 1288 kB VmSwap: 496 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 63 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 126 nonvoluntary_ctxt_switches: 2 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "178", "Ngid" => "0", "Pid" => "178", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "2048", "Groups" => "0", "NStgid" => "178", "NSpid" => "178", "NSpgid" => "178", "NSsid" => "178", "VmPeak" => "9412488 kB", "VmSize" => "9043344 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "164520 kB", "VmRSS" => "90784 kB", "RssAnon" => "63888 kB", "RssFile" => "26896 kB", "RssShmem" => "0 kB", "VmData" => "723532 kB", "VmStk" => "132 kB", "VmExe" => "18236 kB", "VmLib" => "1524 kB", "VmPTE" => "1288 kB", "VmSwap" => "496 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "63", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "126", "nonvoluntary_ctxt_switches" => "2"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 2601721 Ngid: 0 Pid: 2601721 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2601721 NSpid: 2601721 NSpgid: 2601721 NSsid: 178 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 11164 kB VmRSS: 11012 kB RssAnon: 4024 kB RssFile: 6988 kB RssShmem: 0 kB VmData: 45112 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 47 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2601721", "Ngid" => "0", "Pid" => "2601721", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2601721", "NSpid" => "2601721", "NSpgid" => "2601721", "NSsid" => "178", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "11164 kB", "VmRSS" => "11012 kB", "RssAnon" => "4024 kB", "RssFile" => "6988 kB", "RssShmem" => "0 kB", "VmData" => "45112 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "47", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 2601744 Ngid: 0 Pid: 2601744 PPid: 2601721 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 2601744 NSpid: 2601744 NSpgid: 2601744 NSsid: 2601744 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 7 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2601744", "Ngid" => "0", "Pid" => "2601744", "PPid" => "2601721", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "2601744", "NSpid" => "2601744", "NSpgid" => "2601744", "NSsid" => "2601744", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "7"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 2601770 Ngid: 0 Pid: 2601770 PPid: 2601721 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2601770 NSpid: 2601770 NSpgid: 2601770 NSsid: 2601770 VmPeak: 2488 kB VmSize: 2488 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 912 kB VmRSS: 912 kB RssAnon: 88 kB RssFile: 824 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1524 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 43 nonvoluntary_ctxt_switches: 8 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2601770", "Ngid" => "0", "Pid" => "2601770", "PPid" => "2601721", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2601770", "NSpid" => "2601770", "NSpgid" => "2601770", "NSsid" => "2601770", "VmPeak" => "2488 kB", "VmSize" => "2488 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "912 kB", "VmRSS" => "912 kB", "RssAnon" => "88 kB", "RssFile" => "824 kB", "RssShmem" => "0 kB", "VmData" => "224 kB", "VmStk" => "132 kB", "VmExe" => "20 kB", "VmLib" => "1524 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "43", "nonvoluntary_ctxt_switches" => "8"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 2602657 Ngid: 0 Pid: 2602657 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2602657 NSpid: 2602657 NSpgid: 2602657 NSsid: 178 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 11076 kB VmRSS: 10740 kB RssAnon: 3432 kB RssFile: 7308 kB RssShmem: 0 kB VmData: 41016 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 11 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2602657", "Ngid" => "0", "Pid" => "2602657", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2602657", "NSpid" => "2602657", "NSpgid" => "2602657", "NSsid" => "178", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "11076 kB", "VmRSS" => "10740 kB", "RssAnon" => "3432 kB", "RssFile" => "7308 kB", "RssShmem" => "0 kB", "VmData" => "41016 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "11", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 2602681 Ngid: 0 Pid: 2602681 PPid: 2602657 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 2602681 1 NSpid: 2602681 1 NSpgid: 2602681 1 NSsid: 2602681 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 28 nonvoluntary_ctxt_switches: 8 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2602681", "Ngid" => "0", "Pid" => "2602681", "PPid" => "2602657", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "2602681\t1", "NSpid" => "2602681\t1", "NSpgid" => "2602681\t1", "NSsid" => "2602681\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "28", "nonvoluntary_ctxt_switches" => "8"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 2602708 Ngid: 0 Pid: 2602708 PPid: 2602657 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 2602708 1 NSpid: 2602708 1 NSpgid: 2602708 1 NSsid: 2602708 1 VmPeak: 1262188 kB VmSize: 1262188 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38848 kB VmRSS: 38848 kB RssAnon: 15296 kB RssFile: 23552 kB RssShmem: 0 kB VmData: 67012 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 204 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 36 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 825 nonvoluntary_ctxt_switches: 16 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "chaos-operator", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2602708", "Ngid" => "0", "Pid" => "2602708", "PPid" => "2602657", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "1000\t1000\t1000\t1000", "FDSize" => "64", "Groups" => "1000", "NStgid" => "2602708\t1", "NSpid" => "2602708\t1", "NSpgid" => "2602708\t1", "NSsid" => "2602708\t1", "VmPeak" => "1262188 kB", "VmSize" => "1262188 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "38848 kB", "VmRSS" => "38848 kB", "RssAnon" => "15296 kB", "RssFile" => "23552 kB", "RssShmem" => "0 kB", "VmData" => "67012 kB", "VmStk" => "132 kB", "VmExe" => "15232 kB", "VmLib" => "8 kB", "VmPTE" => "204 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "36", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "825", "nonvoluntary_ctxt_switches" => "16"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 2603137 Ngid: 0 Pid: 2603137 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2603137 NSpid: 2603137 NSpgid: 2603137 NSsid: 178 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 11324 kB VmRSS: 10644 kB RssAnon: 3208 kB RssFile: 7436 kB RssShmem: 0 kB VmData: 44856 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 11 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603137", "Ngid" => "0", "Pid" => "2603137", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603137", "NSpid" => "2603137", "NSpgid" => "2603137", "NSsid" => "178", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "11324 kB", "VmRSS" => "10644 kB", "RssAnon" => "3208 kB", "RssFile" => "7436 kB", "RssShmem" => "0 kB", "VmData" => "44856 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "11", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 2603161 Ngid: 0 Pid: 2603161 PPid: 2603137 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 2603161 1 NSpid: 2603161 1 NSpgid: 2603161 1 NSsid: 2603161 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 25 nonvoluntary_ctxt_switches: 11 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603161", "Ngid" => "0", "Pid" => "2603161", "PPid" => "2603137", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "2603161\t1", "NSpid" => "2603161\t1", "NSpgid" => "2603161\t1", "NSsid" => "2603161\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "25", "nonvoluntary_ctxt_switches" => "11"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 2603188 Ngid: 0 Pid: 2603188 PPid: 2603137 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2603188 1 NSpid: 2603188 1 NSpgid: 2603188 1 NSsid: 2603188 1 VmPeak: 748824 kB VmSize: 748824 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41832 kB VmRSS: 41832 kB RssAnon: 12792 kB RssFile: 29040 kB RssShmem: 0 kB VmData: 108936 kB VmStk: 132 kB VmExe: 22072 kB VmLib: 8 kB VmPTE: 204 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 20 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1543 nonvoluntary_ctxt_switches: 15 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603188", "Ngid" => "0", "Pid" => "2603188", "PPid" => "2603137", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603188\t1", "NSpid" => "2603188\t1", "NSpgid" => "2603188\t1", "NSsid" => "2603188\t1", "VmPeak" => "748824 kB", "VmSize" => "748824 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41832 kB", "VmRSS" => "41832 kB", "RssAnon" => "12792 kB", "RssFile" => "29040 kB", "RssShmem" => "0 kB", "VmData" => "108936 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "204 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1543", "nonvoluntary_ctxt_switches" => "15"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] INFO -- CNTI: cmdline_by_pid [2025-07-10 12:06:43] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:43] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:43] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:43] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:43] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:43] INFO -- CNTI: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: current_pid == potential_parent_pid [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 2603858 Ngid: 0 Pid: 2603858 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2603858 NSpid: 2603858 NSpgid: 2603858 NSsid: 178 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10068 kB VmRSS: 9836 kB RssAnon: 3180 kB RssFile: 6656 kB RssShmem: 0 kB VmData: 45112 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 11/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603858", "Ngid" => "0", "Pid" => "2603858", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603858", "NSpid" => "2603858", "NSpgid" => "2603858", "NSsid" => "178", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10068 kB", "VmRSS" => "9836 kB", "RssAnon" => "3180 kB", "RssFile" => "6656 kB", "RssShmem" => "0 kB", "VmData" => "45112 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "11/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 2603869 Ngid: 0 Pid: 2603869 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 2603869 NSpid: 2603869 NSpgid: 2603869 NSsid: 178 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10328 kB VmRSS: 10144 kB RssAnon: 3232 kB RssFile: 6912 kB RssShmem: 0 kB VmData: 41016 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 108 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 7 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603869", "Ngid" => "0", "Pid" => "2603869", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603869", "NSpid" => "2603869", "NSpgid" => "2603869", "NSsid" => "178", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10328 kB", "VmRSS" => "10144 kB", "RssAnon" => "3232 kB", "RssFile" => "6912 kB", "RssShmem" => "0 kB", "VmData" => "41016 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "108 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "7", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 2603910 Ngid: 0 Pid: 2603910 PPid: 2603858 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 2603910 1 NSpid: 2603910 1 NSpgid: 2603910 1 NSsid: 2603910 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 31 nonvoluntary_ctxt_switches: 10 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603910", "Ngid" => "0", "Pid" => "2603910", "PPid" => "2603858", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "2603910\t1", "NSpid" => "2603910\t1", "NSpgid" => "2603910\t1", "NSsid" => "2603910\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "31", "nonvoluntary_ctxt_switches" => "10"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 2603917 Ngid: 0 Pid: 2603917 PPid: 2603869 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 2603917 1 NSpid: 2603917 1 NSpgid: 2603917 1 NSsid: 2603917 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603917", "Ngid" => "0", "Pid" => "2603917", "PPid" => "2603869", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "2603917\t1", "NSpid" => "2603917\t1", "NSpgid" => "2603917\t1", "NSsid" => "2603917\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "9"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: manager Umask: 0022 State: S (sleeping) Tgid: 2603964 Ngid: 0 Pid: 2603964 PPid: 2603858 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 999 999 999 999 FDSize: 64 Groups: 999 NStgid: 2603964 1 NSpid: 2603964 1 NSpgid: 2603964 1 NSsid: 2603964 1 VmPeak: 1315792 kB VmSize: 1315792 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 101356 kB VmRSS: 95012 kB RssAnon: 43772 kB RssFile: 51240 kB RssShmem: 0 kB VmData: 107348 kB VmStk: 132 kB VmExe: 32292 kB VmLib: 8 kB VmPTE: 356 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 58 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 0000000000000000 CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 680 nonvoluntary_ctxt_switches: 19 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "manager", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603964", "Ngid" => "0", "Pid" => "2603964", "PPid" => "2603858", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "999\t999\t999\t999", "FDSize" => "64", "Groups" => "999", "NStgid" => "2603964\t1", "NSpid" => "2603964\t1", "NSpgid" => "2603964\t1", "NSsid" => "2603964\t1", "VmPeak" => "1315792 kB", "VmSize" => "1315792 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "101356 kB", "VmRSS" => "95012 kB", "RssAnon" => "43772 kB", "RssFile" => "51240 kB", "RssShmem" => "0 kB", "VmData" => "107348 kB", "VmStk" => "132 kB", "VmExe" => "32292 kB", "VmLib" => "8 kB", "VmPTE" => "356 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "58", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "0000000000000000", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "680", "nonvoluntary_ctxt_switches" => "19"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: manager Umask: 0022 State: S (sleeping) Tgid: 2603972 Ngid: 0 Pid: 2603972 PPid: 2603869 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 999 999 999 999 FDSize: 64 Groups: 999 NStgid: 2603972 1 NSpid: 2603972 1 NSpgid: 2603972 1 NSsid: 2603972 1 VmPeak: 1308944 kB VmSize: 1308944 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 85968 kB VmRSS: 85968 kB RssAnon: 35176 kB RssFile: 50792 kB RssShmem: 0 kB VmData: 84116 kB VmStk: 132 kB VmExe: 32292 kB VmLib: 8 kB VmPTE: 316 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 43 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 0000000000000000 CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 703 nonvoluntary_ctxt_switches: 9 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "manager", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603972", "Ngid" => "0", "Pid" => "2603972", "PPid" => "2603869", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "999\t999\t999\t999", "FDSize" => "64", "Groups" => "999", "NStgid" => "2603972\t1", "NSpid" => "2603972\t1", "NSpgid" => "2603972\t1", "NSsid" => "2603972\t1", "VmPeak" => "1308944 kB", "VmSize" => "1308944 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "85968 kB", "VmRSS" => "85968 kB", "RssAnon" => "35176 kB", "RssFile" => "50792 kB", "RssShmem" => "0 kB", "VmData" => "84116 kB", "VmStk" => "132 kB", "VmExe" => "32292 kB", "VmLib" => "8 kB", "VmPTE" => "316 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "43", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "0000000000000000", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "703", "nonvoluntary_ctxt_switches" => "9"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 310 Ngid: 568149 Pid: 310 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: 0 NStgid: 310 NSpid: 310 NSpgid: 310 NSsid: 310 VmPeak: 8326140 kB VmSize: 8326140 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126124 kB VmRSS: 115300 kB RssAnon: 81856 kB RssFile: 33444 kB RssShmem: 0 kB VmData: 940556 kB VmStk: 132 kB VmExe: 35224 kB VmLib: 1560 kB VmPTE: 1268 kB VmSwap: 484 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 95 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5758907 nonvoluntary_ctxt_switches: 6235 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kubelet", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "310", "Ngid" => "568149", "Pid" => "310", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "0", "NStgid" => "310", "NSpid" => "310", "NSpgid" => "310", "NSsid" => "310", "VmPeak" => "8326140 kB", "VmSize" => "8326140 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "126124 kB", "VmRSS" => "115300 kB", "RssAnon" => "81856 kB", "RssFile" => "33444 kB", "RssShmem" => "0 kB", "VmData" => "940556 kB", "VmStk" => "132 kB", "VmExe" => "35224 kB", "VmLib" => "1560 kB", "VmPTE" => "1268 kB", "VmSwap" => "484 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "95", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "5758907", "nonvoluntary_ctxt_switches" => "6235"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 402 Ngid: 0 Pid: 402 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 402 NSpid: 402 NSpgid: 402 NSsid: 178 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10988 kB VmRSS: 10472 kB RssAnon: 3036 kB RssFile: 7436 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 104 kB VmSwap: 340 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "402", "Ngid" => "0", "Pid" => "402", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "402", "NSpid" => "402", "NSpgid" => "402", "NSsid" => "178", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10988 kB", "VmRSS" => "10472 kB", "RssAnon" => "3036 kB", "RssFile" => "7436 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "104 kB", "VmSwap" => "340 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 407 Ngid: 0 Pid: 407 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 407 NSpid: 407 NSpgid: 407 NSsid: 178 VmPeak: 1233804 kB VmSize: 1233804 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10472 kB VmRSS: 10292 kB RssAnon: 3380 kB RssFile: 6912 kB RssShmem: 0 kB VmData: 41016 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 104 kB VmSwap: 36 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "407", "Ngid" => "0", "Pid" => "407", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "407", "NSpid" => "407", "NSpgid" => "407", "NSsid" => "178", "VmPeak" => "1233804 kB", "VmSize" => "1233804 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10472 kB", "VmRSS" => "10292 kB", "RssAnon" => "3380 kB", "RssFile" => "6912 kB", "RssShmem" => "0 kB", "VmData" => "41016 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "104 kB", "VmSwap" => "36 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 453 Ngid: 0 Pid: 453 PPid: 407 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 453 1 NSpid: 453 1 NSpgid: 453 1 NSsid: 453 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 27 nonvoluntary_ctxt_switches: 6 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "453", "Ngid" => "0", "Pid" => "453", "PPid" => "407", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "453\t1", "NSpid" => "453\t1", "NSpgid" => "453\t1", "NSsid" => "453\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "27", "nonvoluntary_ctxt_switches" => "6"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 460 Ngid: 0 Pid: 460 PPid: 402 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 460 1 NSpid: 460 1 NSpgid: 460 1 NSsid: 460 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 28 nonvoluntary_ctxt_switches: 11 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "460", "Ngid" => "0", "Pid" => "460", "PPid" => "402", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "460\t1", "NSpid" => "460\t1", "NSpgid" => "460\t1", "NSsid" => "460\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "28", "nonvoluntary_ctxt_switches" => "11"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 515 Ngid: 568923 Pid: 515 PPid: 407 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 515 1 NSpid: 515 1 NSpgid: 515 1 NSsid: 515 1 VmPeak: 1299708 kB VmSize: 1299708 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56944 kB VmRSS: 34364 kB RssAnon: 19532 kB RssFile: 14832 kB RssShmem: 0 kB VmData: 74880 kB VmStk: 132 kB VmExe: 30360 kB VmLib: 8 kB VmPTE: 280 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 34 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 211772 nonvoluntary_ctxt_switches: 607 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kube-proxy", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "515", "Ngid" => "568923", "Pid" => "515", "PPid" => "407", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "515\t1", "NSpid" => "515\t1", "NSpgid" => "515\t1", "NSsid" => "515\t1", "VmPeak" => "1299708 kB", "VmSize" => "1299708 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "56944 kB", "VmRSS" => "34364 kB", "RssAnon" => "19532 kB", "RssFile" => "14832 kB", "RssShmem" => "0 kB", "VmData" => "74880 kB", "VmStk" => "132 kB", "VmExe" => "30360 kB", "VmLib" => "8 kB", "VmPTE" => "280 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "34", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "211772", "nonvoluntary_ctxt_switches" => "607"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 702 Ngid: 1270145 Pid: 702 PPid: 402 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 702 1 NSpid: 702 1 NSpgid: 702 1 NSsid: 702 1 VmPeak: 1285704 kB VmSize: 1285704 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 48900 kB VmRSS: 26680 kB RssAnon: 14540 kB RssFile: 12140 kB RssShmem: 0 kB VmData: 64144 kB VmStk: 132 kB VmExe: 25108 kB VmLib: 8 kB VmPTE: 268 kB VmSwap: 4 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 4/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 233248 nonvoluntary_ctxt_switches: 7100 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "kindnetd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "702", "Ngid" => "1270145", "Pid" => "702", "PPid" => "402", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "702\t1", "NSpid" => "702\t1", "NSpgid" => "702\t1", "NSsid" => "702\t1", "VmPeak" => "1285704 kB", "VmSize" => "1285704 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "48900 kB", "VmRSS" => "26680 kB", "RssAnon" => "14540 kB", "RssFile" => "12140 kB", "RssShmem" => "0 kB", "VmData" => "64144 kB", "VmStk" => "132 kB", "VmExe" => "25108 kB", "VmLib" => "8 kB", "VmPTE" => "268 kB", "VmSwap" => "4 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "38", "SigQ" => "4/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80435fb", "CapEff" => "00000000a80435fb", "CapBnd" => "00000000a80435fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "233248", "nonvoluntary_ctxt_switches" => "7100"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 810 Ngid: 0 Pid: 810 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 810 NSpid: 810 NSpgid: 810 NSsid: 178 VmPeak: 1233548 kB VmSize: 1233548 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 10280 kB VmRSS: 9868 kB RssAnon: 3032 kB RssFile: 6836 kB RssShmem: 0 kB VmData: 40760 kB VmStk: 132 kB VmExe: 3632 kB VmLib: 8 kB VmPTE: 104 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "810", "Ngid" => "0", "Pid" => "810", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "810", "NSpid" => "810", "NSpgid" => "810", "NSsid" => "178", "VmPeak" => "1233548 kB", "VmSize" => "1233548 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "10280 kB", "VmRSS" => "9868 kB", "RssAnon" => "3032 kB", "RssFile" => "6836 kB", "RssShmem" => "0 kB", "VmData" => "40760 kB", "VmStk" => "132 kB", "VmExe" => "3632 kB", "VmLib" => "8 kB", "VmPTE" => "104 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 835 Ngid: 0 Pid: 835 PPid: 810 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 835 1 NSpid: 835 1 NSpgid: 835 1 NSsid: 835 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 8 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "835", "Ngid" => "0", "Pid" => "835", "PPid" => "810", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "835\t1", "NSpid" => "835\t1", "NSpgid" => "835\t1", "NSsid" => "835\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "8"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 866 Ngid: 0 Pid: 866 PPid: 810 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 866 1 NSpid: 866 1 NSpgid: 866 1 NSsid: 866 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 48 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 000001ffffffffff CapEff: 000001ffffffffff CapBnd: 000001ffffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 915 nonvoluntary_ctxt_switches: 7 [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "866", "Ngid" => "0", "Pid" => "866", "PPid" => "810", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "866\t1", "NSpid" => "866\t1", "NSpgid" => "866\t1", "NSsid" => "866\t1", "VmPeak" => "3552 kB", "VmSize" => "1564 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "972 kB", "VmRSS" => "84 kB", "RssAnon" => "80 kB", "RssFile" => "4 kB", "RssShmem" => "0 kB", "VmData" => "52 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "48 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000004", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "000001ffffffffff", "CapEff" => "000001ffffffffff", "CapBnd" => "000001ffffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "915", "nonvoluntary_ctxt_switches" => "7"} [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "2603188", "Ngid" => "0", "Pid" => "2603188", "PPid" => "2603137", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "2603188\t1", "NSpid" => "2603188\t1", "NSpgid" => "2603188\t1", "NSsid" => "2603188\t1", "VmPeak" => "748824 kB", "VmSize" => "748824 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41832 kB", "VmRSS" => "41832 kB", "RssAnon" => "12792 kB", "RssFile" => "29040 kB", "RssShmem" => "0 kB", "VmData" => "108936 kB", "VmStk" => "132 kB", "VmExe" => "22072 kB", "VmLib" => "8 kB", "VmPTE" => "204 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1543", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] [2025-07-10 12:06:43] DEBUG -- CNTI-proctree_by_pid: [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:43] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:44] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:44] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:44] INFO -- CNTI-KubectlClient.Utils.exec_bg: Exec background command in pod cluster-tools-2gwh4 [2025-07-10 12:06:44] DEBUG -- CNTI: ClusterTools exec: {process: #), @wait_count=2, @channel=#>, output: "", error: ""} [2025-07-10 12:06:45] DEBUG -- CNTI: Time left: 9 seconds [2025-07-10 12:06:45] INFO -- CNTI-sig_term_handled: Attached strace to PIDs: 2603188 [2025-07-10 12:06:48] INFO -- CNTI: exec_by_node: Called with JSON [2025-07-10 12:06:48] DEBUG -- CNTI-KubectlClient.Get.pods_by_nodes: Creating list of pods found on nodes [2025-07-10 12:06:48] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource pods [2025-07-10 12:06:48] INFO -- CNTI-KubectlClient.Get.pods_by_nodes: Found 1 pods: cluster-tools-2gwh4 [2025-07-10 12:06:48] DEBUG -- CNTI: cluster_tools_pod_name: cluster-tools-2gwh4 [2025-07-10 12:06:48] INFO -- CNTI-KubectlClient.Utils.exec: Exec command in pod cluster-tools-2gwh4 [2025-07-10 12:06:53] DEBUG -- CNTI: ClusterTools exec: {status: Process::Status[0], output: "", error: ""} ✔️ 🏆PASSED: [sig_term_handled] Sig Term handled ⚖👀 Microservice results: 4 of 7 tests passed  [2025-07-10 12:06:56] INFO -- CNTI-sig_term_handled: PID 2603188 => SIGTERM captured? true [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'sig_term_handled' emoji: ⚖👀 [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sig_term_handled' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points: Task: 'sig_term_handled' type: essential [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'sig_term_handled' tags: ["microservice", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points: Task: 'sig_term_handled' type: essential [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.upsert_task-sig_term_handled: Task start time: 2025-07-10 12:06:26 UTC, end time: 2025-07-10 12:06:56 UTC [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.upsert_task-sig_term_handled: Task: 'sig_term_handled' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:29.713077376 [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tags: ["microservice"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 206, total tasks passed: 4 for tags: ["microservice"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 411, max tasks passed: 7 for tags: ["microservice"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tags: ["microservice"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 206, total tasks passed: 4 for tags: ["microservice"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled"] for tag: microservice [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 411, max tasks passed: 7 for tags: ["microservice"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1300, total tasks passed: 13 for tags: ["essential"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-07-10 12:06:56] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 100, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:06:56] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 206, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:06:56] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 206, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:06:56] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 206, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 411} [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:06:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:06:56] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:06:56] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:06:56] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_latency] [2025-07-10 12:06:56] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_latency: Starting test [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:06:56] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:06:56] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:06:56] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:06:56] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:06:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:56] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:06:56] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:57] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment [2025-07-10 12:06:57] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:06:57] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:06:57] INFO -- CNTI: Spec Hash: [2025-07-10 12:06:57] INFO -- CNTI: Running for: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:06:57] INFO -- CNTI: Spec Hash: [2025-07-10 12:06:57] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-latency/fault.yaml, pod_network_latency_experiment.yaml [2025-07-10 12:06:57] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:06:57] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_experiment.yaml [2025-07-10 12:06:57] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:06:57] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_experiment.yaml [2025-07-10 12:06:57] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-latency/rbac.yaml, pod_network_latency_rbac.yaml [2025-07-10 12:06:57] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:06:57] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_rbac.yaml [2025-07-10 12:06:57] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:06:57] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_latency_rbac.yaml [2025-07-10 12:06:58] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:06:58] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:06:58] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-latency-chaosengine.yml [2025-07-10 12:06:58] INFO -- CNTI: wait_for_test: coredns-coredns-7f1b7ace-pod-network-latency [2025-07-10 12:06:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:06:58] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:00] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:07:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:00] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:02] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:07:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:04] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:07:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:06] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:07:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:07] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:09] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:07:09] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:09] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:11] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:07:11] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:11] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:13] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:07:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:13] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:15] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:07:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:15] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:17] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:07:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:17] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:19] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:07:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:21] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:07:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:23] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:07:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:24] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:26] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:07:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:26] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:28] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:07:28] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:28] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:30] DEBUG -- CNTI: Time left: 1768 seconds [2025-07-10 12:07:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:32] DEBUG -- CNTI: Time left: 1766 seconds [2025-07-10 12:07:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:34] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:07:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:36] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:07:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:38] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:07:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:39] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:41] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:07:41] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:41] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:43] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:07:43] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:43] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:45] DEBUG -- CNTI: Time left: 1754 seconds [2025-07-10 12:07:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:45] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:47] DEBUG -- CNTI: Time left: 1751 seconds [2025-07-10 12:07:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:47] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:49] DEBUG -- CNTI: Time left: 1749 seconds [2025-07-10 12:07:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:51] DEBUG -- CNTI: Time left: 1747 seconds [2025-07-10 12:07:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:53] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:07:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:54] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:56] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:07:56] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:56] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:07:58] DEBUG -- CNTI: Time left: 1741 seconds [2025-07-10 12:07:58] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:07:58] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:00] DEBUG -- CNTI: Time left: 1739 seconds [2025-07-10 12:08:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:00] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:02] DEBUG -- CNTI: Time left: 1736 seconds [2025-07-10 12:08:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:04] DEBUG -- CNTI: Time left: 1734 seconds [2025-07-10 12:08:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:06] DEBUG -- CNTI: Time left: 1732 seconds [2025-07-10 12:08:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:08] DEBUG -- CNTI: Time left: 1730 seconds [2025-07-10 12:08:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:10] DEBUG -- CNTI: Time left: 1728 seconds [2025-07-10 12:08:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:11] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:13] DEBUG -- CNTI: Time left: 1726 seconds [2025-07-10 12:08:13] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:13] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:15] DEBUG -- CNTI: Time left: 1724 seconds [2025-07-10 12:08:15] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:15] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:17] DEBUG -- CNTI: Time left: 1722 seconds [2025-07-10 12:08:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:17] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:19] DEBUG -- CNTI: Time left: 1719 seconds [2025-07-10 12:08:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:21] DEBUG -- CNTI: Time left: 1717 seconds [2025-07-10 12:08:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:23] DEBUG -- CNTI: Time left: 1715 seconds [2025-07-10 12:08:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:25] DEBUG -- CNTI: Time left: 1713 seconds [2025-07-10 12:08:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-7f1b7ace -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:26] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:08:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-7f1b7ace-pod-network-latency -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:08:26] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:08:26] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-7f1b7ace-pod-network-latency -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_latency] pod_network_latency chaos test passed 🗡️💀♻ [2025-07-10 12:08:26] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_latency' emoji: 🗡️💀♻ [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_latency' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_latency' type: bonus [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_latency' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_latency' type: bonus [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_latency: Task start time: 2025-07-10 12:06:56 UTC, end time: 2025-07-10 12:08:26 UTC [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_latency: Task: 'pod_network_latency' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:29.469832906 [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:08:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:08:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:08:26] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:08:26] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:08:26] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_corruption] [2025-07-10 12:08:26] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_corruption: Starting test [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:08:26] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:08:26] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:08:26] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:08:26] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:08:26] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:08:26] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-corruption/fault.yaml, pod_network_corruption_experiment.yaml [2025-07-10 12:08:26] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:08:26] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_experiment.yaml [2025-07-10 12:08:26] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:08:26] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_experiment.yaml [2025-07-10 12:08:27] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-corruption/rbac.yaml, pod_network_corruption_rbac.yaml [2025-07-10 12:08:27] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:08:27] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_rbac.yaml [2025-07-10 12:08:27] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:08:27] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_corruption_rbac.yaml [2025-07-10 12:08:27] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:08:27] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:08:27] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:08:27] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:08:27] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-corruption-chaosengine.yml [2025-07-10 12:08:27] INFO -- CNTI: wait_for_test: coredns-coredns-43-pod-network-corruption [2025-07-10 12:08:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:28] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:30] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:08:30] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:32] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:08:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:34] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:08:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:36] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:08:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:38] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:08:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:40] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:08:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:42] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:08:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:43] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:45] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:08:45] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:45] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:47] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:08:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:47] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:49] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:08:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:51] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:08:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:53] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:08:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:55] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:08:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:08:57] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:08:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:08:58] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:00] DEBUG -- CNTI: Time left: 1768 seconds [2025-07-10 12:09:00] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:00] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:02] DEBUG -- CNTI: Time left: 1766 seconds [2025-07-10 12:09:02] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:04] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:09:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:06] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:09:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:08] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:09:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:10] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:09:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:12] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:09:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:14] DEBUG -- CNTI: Time left: 1753 seconds [2025-07-10 12:09:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:15] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:17] DEBUG -- CNTI: Time left: 1751 seconds [2025-07-10 12:09:17] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:17] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:19] DEBUG -- CNTI: Time left: 1749 seconds [2025-07-10 12:09:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:21] DEBUG -- CNTI: Time left: 1747 seconds [2025-07-10 12:09:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:23] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:09:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:25] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:09:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:27] DEBUG -- CNTI: Time left: 1741 seconds [2025-07-10 12:09:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:29] DEBUG -- CNTI: Time left: 1739 seconds [2025-07-10 12:09:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:32] DEBUG -- CNTI: Time left: 1736 seconds [2025-07-10 12:09:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:34] DEBUG -- CNTI: Time left: 1734 seconds [2025-07-10 12:09:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:36] DEBUG -- CNTI: Time left: 1732 seconds [2025-07-10 12:09:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:38] DEBUG -- CNTI: Time left: 1730 seconds [2025-07-10 12:09:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:40] DEBUG -- CNTI: Time left: 1728 seconds [2025-07-10 12:09:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:42] DEBUG -- CNTI: Time left: 1726 seconds [2025-07-10 12:09:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:44] DEBUG -- CNTI: Time left: 1724 seconds [2025-07-10 12:09:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:45] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:47] DEBUG -- CNTI: Time left: 1721 seconds [2025-07-10 12:09:47] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:47] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:49] DEBUG -- CNTI: Time left: 1719 seconds [2025-07-10 12:09:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:51] DEBUG -- CNTI: Time left: 1717 seconds [2025-07-10 12:09:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:51] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:09:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-43-pod-network-corruption -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:09:51] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:09:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-43-pod-network-corruption -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_corruption] pod_network_corruption chaos test passed 🗡️💀♻ [2025-07-10 12:09:51] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_corruption' emoji: 🗡️💀♻ [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_corruption' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_corruption' type: bonus [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_corruption' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_corruption' type: bonus [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_corruption: Task start time: 2025-07-10 12:08:26 UTC, end time: 2025-07-10 12:09:51 UTC [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_corruption: Task: 'pod_network_corruption' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:25.361213447 [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:09:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:09:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:09:51] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:09:51] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:09:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [disk_fill] [2025-07-10 12:09:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.Task.task_runner.disk_fill: Starting test [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:09:51] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:09:51] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:09:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:09:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:09:52] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/disk-fill/fault.yaml, disk_fill_experiment.yaml [2025-07-10 12:09:52] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:09:52] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_experiment.yaml [2025-07-10 12:09:52] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:09:52] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_experiment.yaml [2025-07-10 12:09:52] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/disk-fill/rbac.yaml, disk_fill_rbac.yaml [2025-07-10 12:09:52] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:09:52] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_rbac.yaml [2025-07-10 12:09:52] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:09:52] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/disk_fill_rbac.yaml [2025-07-10 12:09:52] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:09:53] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:09:53] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:09:53] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:09:53] INFO -- CNTI-coredns-coredns-85:spec_labels: Spec labels for chaos template. Key: app.kubernetes.io/instance; Value: coredns [2025-07-10 12:09:53] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/disk-fill-chaosengine.yml [2025-07-10 12:09:53] INFO -- CNTI: wait_for_test: coredns-coredns-85-disk-fill [2025-07-10 12:09:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:55] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:09:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:57] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:09:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:09:59] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:09:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:09:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:01] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:10:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:04] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:10:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:06] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:10:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:08] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:10:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:10] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:10:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:12] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:10:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:14] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:10:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:16] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:10:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:17] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:19] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:10:19] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:21] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:10:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:23] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:10:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:25] DEBUG -- CNTI: Time left: 1768 seconds [2025-07-10 12:10:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:27] DEBUG -- CNTI: Time left: 1766 seconds [2025-07-10 12:10:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:29] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:10:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:29] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:31] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:10:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:31] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:33] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:10:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:36] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:10:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:38] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:10:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:40] DEBUG -- CNTI: Time left: 1753 seconds [2025-07-10 12:10:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:42] DEBUG -- CNTI: Time left: 1751 seconds [2025-07-10 12:10:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:44] DEBUG -- CNTI: Time left: 1749 seconds [2025-07-10 12:10:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:46] DEBUG -- CNTI: Time left: 1747 seconds [2025-07-10 12:10:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:46] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:48] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:10:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:51] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:10:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:53] DEBUG -- CNTI: Time left: 1741 seconds [2025-07-10 12:10:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:55] DEBUG -- CNTI: Time left: 1739 seconds [2025-07-10 12:10:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:57] DEBUG -- CNTI: Time left: 1736 seconds [2025-07-10 12:10:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:10:59] DEBUG -- CNTI: Time left: 1734 seconds [2025-07-10 12:10:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:10:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:01] DEBUG -- CNTI: Time left: 1732 seconds [2025-07-10 12:11:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:01] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:03] DEBUG -- CNTI: Time left: 1730 seconds [2025-07-10 12:11:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:06] DEBUG -- CNTI: Time left: 1728 seconds [2025-07-10 12:11:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:08] DEBUG -- CNTI: Time left: 1726 seconds [2025-07-10 12:11:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:10] DEBUG -- CNTI: Time left: 1724 seconds [2025-07-10 12:11:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:12] DEBUG -- CNTI: Time left: 1721 seconds [2025-07-10 12:11:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:14] DEBUG -- CNTI: Time left: 1719 seconds [2025-07-10 12:11:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:16] DEBUG -- CNTI: Time left: 1717 seconds [2025-07-10 12:11:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-85 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:16] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:11:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-85-disk-fill -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:11:16] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:11:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-85-disk-fill -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ PASSED: [disk_fill] disk_fill chaos test passed 🗡️💀♻ [2025-07-10 12:11:17] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'disk_fill' emoji: 🗡️💀♻ [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'disk_fill' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points: Task: 'disk_fill' type: normal [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'disk_fill' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points: Task: 'disk_fill' type: normal [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Points.upsert_task-disk_fill: Task start time: 2025-07-10 12:09:51 UTC, end time: 2025-07-10 12:11:17 UTC [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.Points.upsert_task-disk_fill: Task: 'disk_fill' has status: 'passed' and is awarded: 5 points.Runtime: 00:01:25.377513703 [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:11:17] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:11:17] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:11:17] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:11:17] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:11:17] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_delete] [2025-07-10 12:11:17] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.Task.task_runner.pod_delete: Starting test [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:11:17] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:11:17] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:11:17] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:11:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:11:17] INFO -- CNTI: Spec Hash: [2025-07-10 12:11:17] INFO -- CNTI: Running for: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} [2025-07-10 12:11:17] INFO -- CNTI: Spec Hash: [2025-07-10 12:11:17] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-delete/fault.yaml, pod_delete_experiment.yaml [2025-07-10 12:11:17] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:11:17] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_experiment.yaml [2025-07-10 12:11:17] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:11:17] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-delete/rbac.yaml, pod_delete_rbac.yaml [2025-07-10 12:11:17] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:11:17] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_rbac.yaml [2025-07-10 12:11:17] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:11:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_experiment.yaml [2025-07-10 12:11:18] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_delete_rbac.yaml [2025-07-10 12:11:18] INFO -- CNTI: resource: coredns-coredns [2025-07-10 12:11:18] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:11:18] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:11:18] INFO -- CNTI: template: apiVersion: litmuschaos.io/v1alpha1 kind: ChaosEngine metadata: name: coredns-coredns-89 namespace: cnf-default spec: engineState: 'active' appinfo: appns: 'cnf-default' applabel: 'app.kubernetes.io/instance=coredns' appkind: 'deployment' chaosServiceAccount: pod-delete-sa jobCleanUpPolicy: 'delete' experiments: - name: pod-delete spec: components: env: # specify the fill percentage according to the disk pressure required - name: TOTAL_CHAOS_DURATION value: '30' - name: CHAOS_INTERVAL value: '10' - name: TARGET_PODS value: '' - name: FORCE value: 'false' [2025-07-10 12:11:18] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-delete-chaosengine.yml [2025-07-10 12:11:18] INFO -- CNTI: wait_for_test: coredns-coredns-89-pod-delete [2025-07-10 12:11:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:18] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:20] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:11:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:23] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:11:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:25] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:11:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:27] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:11:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:29] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:11:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:29] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:31] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:11:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:31] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:33] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:11:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:33] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:35] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:11:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:35] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:37] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:11:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:40] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:11:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:42] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:11:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:44] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:11:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:46] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:11:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:46] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:48] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:11:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:48] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:50] DEBUG -- CNTI: Time left: 1768 seconds [2025-07-10 12:11:50] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:50] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:52] DEBUG -- CNTI: Time left: 1766 seconds [2025-07-10 12:11:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:55] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:11:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:57] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:11:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:11:59] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:11:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:11:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:01] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:12:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:01] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:03] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:12:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:03] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:05] DEBUG -- CNTI: Time left: 1754 seconds [2025-07-10 12:12:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:05] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:07] DEBUG -- CNTI: Time left: 1751 seconds [2025-07-10 12:12:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:10] DEBUG -- CNTI: Time left: 1749 seconds [2025-07-10 12:12:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:12] DEBUG -- CNTI: Time left: 1747 seconds [2025-07-10 12:12:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:14] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:12:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:16] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:12:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-89 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:16] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:12:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-89-pod-delete -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:12:16] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:12:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-89-pod-delete -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ PASSED: [pod_delete] pod_delete chaos test passed 🗡️💀♻ [2025-07-10 12:12:16] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_delete' emoji: 🗡️💀♻ [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_delete' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_delete' type: normal [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_delete' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_delete' type: normal [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_delete: Task start time: 2025-07-10 12:11:17 UTC, end time: 2025-07-10 12:12:16 UTC [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.Points.upsert_task-pod_delete: Task: 'pod_delete' has status: 'passed' and is awarded: 5 points.Runtime: 00:00:59.665827338 [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:12:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:12:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:12:16] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:12:16] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:12:16] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_memory_hog] [2025-07-10 12:12:16] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.Task.task_runner.pod_memory_hog: Starting test [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:12:16] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:12:16] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:12:16] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:12:16] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:12:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:16] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:12:16] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:17] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:12:17] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:17] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-memory-hog/fault.yaml, pod_memory_hog_experiment.yaml [2025-07-10 12:12:17] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:12:17] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_experiment.yaml [2025-07-10 12:12:17] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:12:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_experiment.yaml [2025-07-10 12:12:17] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-memory-hog/rbac.yaml, pod_memory_hog_rbac.yaml [2025-07-10 12:12:17] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:12:17] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_rbac.yaml [2025-07-10 12:12:17] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:12:17] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_memory_hog_rbac.yaml [2025-07-10 12:12:18] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:12:18] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:12:18] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:12:18] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:18] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-memory-hog-chaosengine.yml [2025-07-10 12:12:18] INFO -- CNTI: wait_for_test: coredns-coredns-14-pod-memory-hog [2025-07-10 12:12:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:18] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:20] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:12:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:20] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:22] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:12:22] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:22] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:24] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:12:24] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:27] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:12:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:29] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:12:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:29] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:31] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:12:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:31] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:33] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:12:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:33] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:35] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:12:35] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:35] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:37] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:12:37] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:37] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:39] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:12:39] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:42] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:12:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:44] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:12:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:46] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:12:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:46] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:48] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:12:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-14 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:48] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:12:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-14-pod-memory-hog -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:12:48] INFO -- CNTI: status_code: 0, response: Error [2025-07-10 12:12:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-14-pod-memory-hog -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:12:48] INFO -- CNTI: status_code: 0, response: Error [2025-07-10 12:12:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-14-pod-memory-hog -n cnf-default -o 'json' ✖️ FAILED: [pod_memory_hog] pod_memory_hog chaos test failed 🗡️💀♻ [2025-07-10 12:12:48] INFO -- CNTI: status_code: 0, response: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-07-10T12:12:25Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "515002d8-6c0a-4249-8433-23a51515f133", "batch.kubernetes.io/job-name": "pod-memory-hog-labwuw", "chaosUID": "3710a996-6477-467d-acae-319625ea8252", "controller-uid": "515002d8-6c0a-4249-8433-23a51515f133", "job-name": "pod-memory-hog-labwuw", "name": "pod-memory-hog" }, "name": "coredns-coredns-14-pod-memory-hog", "namespace": "cnf-default", "resourceVersion": "4612693", "uid": "423a3e61-05e8-4cbd-9fee-ef3688cd1409" }, "spec": { "engine": "coredns-coredns-14", "experiment": "pod-memory-hog" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-memory-hog-helper-9wvjf\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-56898dd654-8vnpt, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-07-10 12:12:48] DEBUG -- CNTI-LitmusManager.check_chaos_verdict#details: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-07-10T12:12:25Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "515002d8-6c0a-4249-8433-23a51515f133", "batch.kubernetes.io/job-name": "pod-memory-hog-labwuw", "chaosUID": "3710a996-6477-467d-acae-319625ea8252", "controller-uid": "515002d8-6c0a-4249-8433-23a51515f133", "job-name": "pod-memory-hog-labwuw", "name": "pod-memory-hog" }, "name": "coredns-coredns-14-pod-memory-hog", "namespace": "cnf-default", "resourceVersion": "4612693", "uid": "423a3e61-05e8-4cbd-9fee-ef3688cd1409" }, "spec": { "engine": "coredns-coredns-14", "experiment": "pod-memory-hog" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-memory-hog-helper-9wvjf\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-56898dd654-8vnpt, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-07-10 12:12:48] INFO -- CNTI-LitmusManager.check_chaos_verdict: pod-memory-hog chaos test failed: coredns-coredns-14-pod-memory-hog, verdict: Error [2025-07-10 12:12:48] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: false [2025-07-10 12:12:48] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:12:48] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:12:48] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_memory_hog' emoji: 🗡️💀♻ [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_memory_hog' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_memory_hog' type: normal [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 0 points [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_memory_hog' tags: ["resilience", "dynamic", "workload", "normal"] [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_memory_hog' type: normal [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_memory_hog: Task start time: 2025-07-10 12:12:16 UTC, end time: 2025-07-10 12:12:49 UTC [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.Points.upsert_task-pod_memory_hog: Task: 'pod_memory_hog' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:32.196588719 [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:12:49] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:12:49] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:12:49] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:12:49] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:12:49] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_io_stress] [2025-07-10 12:12:49] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.Task.task_runner.pod_io_stress: Starting test [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:12:49] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:12:49] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:12:49] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:12:49] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:49] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-io-stress/fault.yaml, pod_io_stress_experiment.yaml [2025-07-10 12:12:49] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:12:49] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_experiment.yaml [2025-07-10 12:12:49] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:12:49] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_experiment.yaml [2025-07-10 12:12:49] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-io-stress/rbac.yaml, pod_io_stress_rbac.yaml [2025-07-10 12:12:49] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:12:49] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_rbac.yaml [2025-07-10 12:12:49] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:12:49] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_io_stress_rbac.yaml [2025-07-10 12:12:50] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:12:50] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:12:50] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:12:50] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:12:50] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-io-stress-chaosengine.yml [2025-07-10 12:12:50] INFO -- CNTI: wait_for_test: coredns-coredns-42-pod-io-stress [2025-07-10 12:12:50] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:50] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:52] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:12:52] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:55] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:12:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:57] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:12:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:12:59] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:12:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:12:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:01] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:13:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:01] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:03] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:13:03] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:03] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:05] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:13:05] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:05] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:07] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:13:07] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:10] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:13:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:12] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:13:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:14] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:13:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:16] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:13:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:16] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:18] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:13:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:18] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:20] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:13:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-42 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:20] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:13:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-42-pod-io-stress -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:13:20] INFO -- CNTI: status_code: 0, response: Error [2025-07-10 12:13:20] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-42-pod-io-stress -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:13:21] INFO -- CNTI: status_code: 0, response: Error [2025-07-10 12:13:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-42-pod-io-stress -n cnf-default -o 'json' ✖️ ✨FAILED: [pod_io_stress] pod_io_stress chaos test failed 🗡️💀♻ [2025-07-10 12:13:21] INFO -- CNTI: status_code: 0, response: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-07-10T12:12:58Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "04e9980d-7bf1-412d-a657-c4910fce9739", "batch.kubernetes.io/job-name": "pod-io-stress-nyoz1a", "chaosUID": "a10ea1a3-81d9-4a45-9277-58687503f4f4", "controller-uid": "04e9980d-7bf1-412d-a657-c4910fce9739", "job-name": "pod-io-stress-nyoz1a", "name": "pod-io-stress" }, "name": "coredns-coredns-42-pod-io-stress", "namespace": "cnf-default", "resourceVersion": "4612867", "uid": "d0dcc388-d6e7-44cd-a540-cdd8492a16ce" }, "spec": { "engine": "coredns-coredns-42", "experiment": "pod-io-stress" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-io-stress-helper-n6xcx\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-56898dd654-8vnpt, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-07-10 12:13:21] DEBUG -- CNTI-LitmusManager.check_chaos_verdict#details: { "apiVersion": "litmuschaos.io/v1alpha1", "kind": "ChaosResult", "metadata": { "creationTimestamp": "2025-07-10T12:12:58Z", "generation": 3, "labels": { "app.kubernetes.io/component": "experiment-job", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/runtime-api-usage": "true", "app.kubernetes.io/version": "3.6.0", "batch.kubernetes.io/controller-uid": "04e9980d-7bf1-412d-a657-c4910fce9739", "batch.kubernetes.io/job-name": "pod-io-stress-nyoz1a", "chaosUID": "a10ea1a3-81d9-4a45-9277-58687503f4f4", "controller-uid": "04e9980d-7bf1-412d-a657-c4910fce9739", "job-name": "pod-io-stress-nyoz1a", "name": "pod-io-stress" }, "name": "coredns-coredns-42-pod-io-stress", "namespace": "cnf-default", "resourceVersion": "4612867", "uid": "d0dcc388-d6e7-44cd-a540-cdd8492a16ce" }, "spec": { "engine": "coredns-coredns-42", "experiment": "pod-io-stress" }, "status": { "experimentStatus": { "errorOutput": { "errorCode": "HELPER_ERROR", "reason": "{\"source\":\"pod-io-stress-helper-n6xcx\",\"errorCode\":\"HELPER_ERROR\",\"phase\":\"ChaosInject\",\"reason\":\"could not find valid cgroup\",\"target\":\"{podName: coredns-coredns-56898dd654-8vnpt, namespace: cnf-default, container: coredns}\"}" }, "phase": "Error", "probeSuccessPercentage": "0", "verdict": "Error" }, "history": { "failedRuns": 0, "passedRuns": 0, "stoppedRuns": 0 } } } [2025-07-10 12:13:21] INFO -- CNTI-LitmusManager.check_chaos_verdict: pod-io-stress chaos test failed: coredns-coredns-42-pod-io-stress, verdict: Error [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: false [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: false [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_io_stress' emoji: 🗡️💀♻ [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_io_stress' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_io_stress' type: bonus [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_io_stress is worth: 0 points [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_io_stress' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_io_stress' type: bonus [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_io_stress: Task start time: 2025-07-10 12:12:49 UTC, end time: 2025-07-10 12:13:21 UTC [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Points.upsert_task-pod_io_stress: Task: 'pod_io_stress' has status: 'failed' and is awarded: 0 points.Runtime: 00:00:32.192497810 [2025-07-10 12:13:21] INFO -- CNTI-KubectlClient.Delete.resource: Delete resource all [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:13:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:13:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:13:21] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:13:21] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:13:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_dns_error] [2025-07-10 12:13:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Task.task_runner.pod_dns_error: Starting test [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.container_runtimes: Get container runtimes of nodes [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource nodes ⏭️ SKIPPED: [pod_dns_error] pod_dns_error docker runtime not found 🗡️💀♻ [2025-07-10 12:13:21] INFO -- CNTI: pod_dns_error runtimes: ["containerd://2.1.1"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_dns_error' emoji: 🗡️💀♻ [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_dns_error' tags: ["resilience", "dynamic", "workload"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_dns_error' type: [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 0 points [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_dns_error' tags: ["resilience", "dynamic", "workload"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_dns_error' type: [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_dns_error: Task start time: 2025-07-10 12:13:21 UTC, end time: 2025-07-10 12:13:21 UTC [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Points.upsert_task-pod_dns_error: Task: 'pod_dns_error' has status: 'skipped' and is awarded: 0 points.Runtime: 00:00:00.153705875 [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:13:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:13:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:13:21] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:13:21] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:13:21] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [pod_network_duplication] [2025-07-10 12:13:21] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.Task.task_runner.pod_network_duplication: Starting test [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:13:21] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:13:21] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:13:21] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:13:21] INFO -- CNTI: Current Resource Name: coredns-coredns Type: Deployment Namespace: cnf-default [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:13:21] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:13:21] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/pod-network-duplication/fault.yaml, pod_network_duplication_experiment.yaml [2025-07-10 12:13:21] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:13:21] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_experiment.yaml [2025-07-10 12:13:21] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:13:22] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_experiment.yaml [2025-07-10 12:13:22] INFO -- CNTI: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/pod-network-duplication/rbac.yaml, pod_network_duplication_rbac.yaml [2025-07-10 12:13:22] INFO -- CNTI: chaos_manifests_path [2025-07-10 12:13:22] INFO -- CNTI: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_rbac.yaml [2025-07-10 12:13:22] DEBUG -- CNTI-http.client: Performing request [2025-07-10 12:13:22] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file /home/xtesting/.cnf-testsuite/tools/chaos-experiments/pod_network_duplication_rbac.yaml coredns-coredns [2025-07-10 12:13:22] INFO -- CNTI-KubectlClient.Utils.annotate: Annotate deployment/coredns-coredns with litmuschaos.io/chaos="true" [2025-07-10 12:13:22] WARN -- CNTI-KubectlClient.Utils.annotate.cmd: stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") [2025-07-10 12:13:22] DEBUG -- CNTI-KubectlClient.Get.resource_spec_labels: Get labels of resource Deployment/coredns-coredns [2025-07-10 12:13:22] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:13:23] INFO -- CNTI-KubectlClient.Apply.file: Apply resources from file installed_cnf_files/temp_files/pod-network-duplication-chaosengine.yml [2025-07-10 12:13:23] INFO -- CNTI: wait_for_test: coredns-coredns-43-pod-network-duplication [2025-07-10 12:13:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:25] DEBUG -- CNTI: Time left: 1798 seconds [2025-07-10 12:13:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:27] DEBUG -- CNTI: Time left: 1796 seconds [2025-07-10 12:13:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:29] DEBUG -- CNTI: Time left: 1794 seconds [2025-07-10 12:13:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:30] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:32] DEBUG -- CNTI: Time left: 1792 seconds [2025-07-10 12:13:32] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:32] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:34] DEBUG -- CNTI: Time left: 1790 seconds [2025-07-10 12:13:34] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:36] DEBUG -- CNTI: Time left: 1788 seconds [2025-07-10 12:13:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:38] DEBUG -- CNTI: Time left: 1786 seconds [2025-07-10 12:13:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:40] DEBUG -- CNTI: Time left: 1783 seconds [2025-07-10 12:13:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:42] DEBUG -- CNTI: Time left: 1781 seconds [2025-07-10 12:13:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:44] DEBUG -- CNTI: Time left: 1779 seconds [2025-07-10 12:13:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:46] DEBUG -- CNTI: Time left: 1777 seconds [2025-07-10 12:13:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:47] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:49] DEBUG -- CNTI: Time left: 1775 seconds [2025-07-10 12:13:49] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:51] DEBUG -- CNTI: Time left: 1773 seconds [2025-07-10 12:13:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:51] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:53] DEBUG -- CNTI: Time left: 1771 seconds [2025-07-10 12:13:53] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:53] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:55] DEBUG -- CNTI: Time left: 1768 seconds [2025-07-10 12:13:55] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:55] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:57] DEBUG -- CNTI: Time left: 1766 seconds [2025-07-10 12:13:57] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:57] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:13:59] DEBUG -- CNTI: Time left: 1764 seconds [2025-07-10 12:13:59] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:13:59] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:01] DEBUG -- CNTI: Time left: 1762 seconds [2025-07-10 12:14:01] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:02] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:04] DEBUG -- CNTI: Time left: 1760 seconds [2025-07-10 12:14:04] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:04] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:06] DEBUG -- CNTI: Time left: 1758 seconds [2025-07-10 12:14:06] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:06] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:08] DEBUG -- CNTI: Time left: 1756 seconds [2025-07-10 12:14:08] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:08] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:10] DEBUG -- CNTI: Time left: 1754 seconds [2025-07-10 12:14:10] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:10] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:12] DEBUG -- CNTI: Time left: 1751 seconds [2025-07-10 12:14:12] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:12] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:14] DEBUG -- CNTI: Time left: 1749 seconds [2025-07-10 12:14:14] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:14] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:16] DEBUG -- CNTI: Time left: 1747 seconds [2025-07-10 12:14:16] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:16] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:18] DEBUG -- CNTI: Time left: 1745 seconds [2025-07-10 12:14:18] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:19] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:21] DEBUG -- CNTI: Time left: 1743 seconds [2025-07-10 12:14:21] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:21] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:23] DEBUG -- CNTI: Time left: 1741 seconds [2025-07-10 12:14:23] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:23] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:25] DEBUG -- CNTI: Time left: 1739 seconds [2025-07-10 12:14:25] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:25] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:27] DEBUG -- CNTI: Time left: 1736 seconds [2025-07-10 12:14:27] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:27] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:29] DEBUG -- CNTI: Time left: 1734 seconds [2025-07-10 12:14:29] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:29] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:31] DEBUG -- CNTI: Time left: 1732 seconds [2025-07-10 12:14:31] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:31] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:33] DEBUG -- CNTI: Time left: 1730 seconds [2025-07-10 12:14:33] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:34] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:36] DEBUG -- CNTI: Time left: 1728 seconds [2025-07-10 12:14:36] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:36] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:38] DEBUG -- CNTI: Time left: 1726 seconds [2025-07-10 12:14:38] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:38] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:40] DEBUG -- CNTI: Time left: 1724 seconds [2025-07-10 12:14:40] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:40] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:42] DEBUG -- CNTI: Time left: 1722 seconds [2025-07-10 12:14:42] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:42] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:44] DEBUG -- CNTI: Time left: 1719 seconds [2025-07-10 12:14:44] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:44] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:46] DEBUG -- CNTI: Time left: 1717 seconds [2025-07-10 12:14:46] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:46] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:48] DEBUG -- CNTI: Time left: 1715 seconds [2025-07-10 12:14:48] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:49] INFO -- CNTI: status_code: 0, response: initialized [2025-07-10 12:14:51] DEBUG -- CNTI: Time left: 1713 seconds [2025-07-10 12:14:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-43 -n cnf-default -o 'jsonpath={.status.engineStatus}' [2025-07-10 12:14:51] INFO -- CNTI: status_code: 0, response: completed [2025-07-10 12:14:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-43-pod-network-duplication -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' [2025-07-10 12:14:51] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:14:51] INFO -- CNTI: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-43-pod-network-duplication -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' ✔️ ✨PASSED: [pod_network_duplication] pod_network_duplication chaos test passed 🗡️💀♻ [2025-07-10 12:14:51] INFO -- CNTI: status_code: 0, response: Pass [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'pod_network_duplication' emoji: 🗡️💀♻ [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_duplication' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_duplication' type: bonus [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'pod_network_duplication' tags: ["resilience", "dynamic", "workload", "bonus"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points: Task: 'pod_network_duplication' type: bonus [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.upsert_task-pod_network_duplication: Task start time: 2025-07-10 12:13:21 UTC, end time: 2025-07-10 12:14:51 UTC [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Points.upsert_task-pod_network_duplication: Task: 'pod_network_duplication' has status: 'passed' and is awarded: 1 points.Runtime: 00:01:29.792403586 [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:14:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:14:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:14:51] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:14:51] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:14:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [liveness] [2025-07-10 12:14:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Task.task_runner.liveness: Starting test [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [liveness] Helm liveness probe found ⎈🧫 [2025-07-10 12:14:51] INFO -- CNTI-liveness: Resource Deployment/coredns-coredns passed liveness?: true [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:14:51] INFO -- CNTI-liveness: Workload resource task response: true [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'liveness' emoji: ⎈🧫 [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'liveness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points: Task: 'liveness' type: essential [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'liveness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points: Task: 'liveness' type: essential [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Points.upsert_task-liveness: Task start time: 2025-07-10 12:14:51 UTC, end time: 2025-07-10 12:14:51 UTC [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Points.upsert_task-liveness: Task: 'liveness' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.285089183 [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:14:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" [2025-07-10 12:14:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Task.ensure_cnf_installed!: Is CNF installed: true [2025-07-10 12:14:51] INFO -- CNTI: check_cnf_config args: # [2025-07-10 12:14:51] INFO -- CNTI: check_cnf_config cnf: [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_config_list: Retrieve CNF config file [2025-07-10 12:14:51] DEBUG -- CNTI: find command: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [readiness] [2025-07-10 12:14:51] DEBUG -- CNTI: find output: installed_cnf_files/cnf-testsuite.yml [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.cnf_config_list: Found CNF config file: ["installed_cnf_files/cnf-testsuite.yml"] [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.Task.task_runner: Run task with args # "installed_cnf_files/cnf-testsuite.yml"}> [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.Task.task_runner.readiness: Starting test [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Start resources test [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_workload_resources: Map block to CNF workload resources [2025-07-10 12:14:51] DEBUG -- CNTI-CNFManager.cnf_resource_ymls: Load YAMLs from manifest: installed_cnf_files/common_manifest.yml [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Deployment [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Service [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: Pod [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ReplicaSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: StatefulSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: DaemonSet [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: kind: ServiceAccount [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_by_kind: ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.all_workload_resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] [2025-07-10 12:14:51] DEBUG -- CNTI-Helm.workload_resource_kind_names: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Found 2 resources to test: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] [2025-07-10 12:14:51] INFO -- CNTI-CNFManager.workload_resource_test: Testing Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource_volumes: Get volumes of Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource_containers: Get containers of Deployment/coredns-coredns [2025-07-10 12:14:51] DEBUG -- CNTI-KubectlClient.Get.resource: Get resource Deployment/coredns-coredns ✔️ 🏆PASSED: [readiness] Helm readiness probe found ⎈🧫 Reliability, resilience, and availability results: 7 of 9 tests passed  Final workload score: 1615 of 1955 Test results have been saved to results/cnf-testsuite-results-20250710-120025-089.yml [2025-07-10 12:14:52] DEBUG -- CNTI-readiness: coredns [2025-07-10 12:14:52] INFO -- CNTI-readiness: Resource Deployment/coredns-coredns passed liveness?: true [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.workload_resource_test: Container result: true [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.workload_resource_test: Testing Service/coredns-coredns [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.workload_resource_test: Workload resource test intialized: true, test passed: true [2025-07-10 12:14:52] INFO -- CNTI-readiness: Workload resource task response: true [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.emoji_by_task: Task: 'readiness' emoji: ⎈🧫 [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'readiness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points: Task: 'readiness' type: essential [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tags_by_task: Task: 'readiness' tags: ["resilience", "dynamic", "workload", "cert", "essential"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points: Task: 'readiness' type: essential [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.upsert_task-readiness: Task start time: 2025-07-10 12:14:51 UTC, end time: 2025-07-10 12:14:52 UTC [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.upsert_task-readiness: Task: 'readiness' has status: 'passed' and is awarded: 100 points.Runtime: 00:00:00.264717439 [2025-07-10 12:14:52] DEBUG -- CNTI: resilience [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tags: ["resilience"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 213, total tasks passed: 7 for tags: ["resilience"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 223, max tasks passed: 9 for tags: ["resilience"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tags: ["resilience"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 213, total tasks passed: 7 for tags: ["resilience"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "liveness", "readiness"] for tag: resilience [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 223, max tasks passed: 9 for tags: ["resilience"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tags: ["essential"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1500, total tasks passed: 15 for tags: ["essential"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] for tag: essential [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1800, max tasks passed: 18 for tags: ["essential"] [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 206, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-07-10 12:14:52] DEBUG -- CNTI: workload [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tag: workload [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_tasks_points: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tags: ["workload"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_tasks_points: Total points scored: 1615, total tasks passed: 42 for tags: ["workload"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["reasonable_image_size", "specialized_init_system", "reasonable_startup_time", "single_process_type", "zombie_handled", "service_discovery", "shared_database", "sig_term_handled", "cni_compatible", "privilege_escalation", "symlink_file_system", "application_credentials", "host_network", "increase_decrease_capacity", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_delete", "pod_io_stress", "pod_memory_hog", "disk_fill", "pod_dns_error", "versioned_tag", "ip_addresses", "operator_installed", "liveness", "readiness", "rolling_update", "rolling_downgrade", "rolling_version_change", "rollback", "deprecated_k8s_features", "nodeport_not_used", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "secrets_used", "immutable_configmap", "helm_deploy", "helm_chart_valid", "helm_chart_published", "no_local_volume_configuration", "elastic_volumes", "database_persistence", "node_drain", "service_account_mapping", "privileged_containers", "non_root_containers", "host_pid_ipc_privileges", "linux_hardening", "cpu_limits", "memory_limits", "immutable_file_systems", "hostpath_mounts", "ingress_egress_blocked", "insecure_capabilities", "sysctls", "log_output", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "alpha_k8s_apis", "container_sock_mounts", "require_labels", "external_ips", "selinux_options", "default_namespace", "latest_tag"] for tag: workload [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Skipped tests: ["cni_compatible", "database_persistence", "secrets_used", "alpha_k8s_apis", "prometheus_traffic", "open_metrics", "routed_logs", "tracing", "pod_dns_error"] [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Failed tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.tasks_by_tag: Found tasks: ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] for tag: bonus [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tests: ["elastic_volumes", "privilege_escalation", "linux_hardening", "ingress_egress_blocked", "non_root_containers", "immutable_file_systems", "service_account_mapping", "immutable_configmap", "reasonable_image_size", "specialized_init_system", "pod_memory_hog", "pod_io_stress"] [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_image_size -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_image_size [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_image_size is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: specialized_init_system -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: specialized_init_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: specialized_init_system is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: reasonable_startup_time -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: reasonable_startup_time [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: reasonable_startup_time is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: single_process_type -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: single_process_type [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: single_process_type is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: zombie_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: zombie_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: zombie_handled is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_discovery -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_discovery [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: service_discovery is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: shared_database -> failed: false, skipped: NA: false, bonus: {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0} [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: shared_database [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sig_term_handled -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sig_term_handled [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: sig_term_handled is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cni_compatible -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cni_compatible [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: cni_compatible is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privilege_escalation -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privilege_escalation [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: privilege_escalation is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: symlink_file_system -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: symlink_file_system [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: symlink_file_system is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: application_credentials -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: application_credentials [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: application_credentials is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_network -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_network [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: host_network is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: increase_decrease_capacity -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: increase_decrease_capacity [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: increase_decrease_capacity is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_latency -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_latency [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_latency is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_corruption -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_corruption [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_corruption is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_network_duplication -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_network_duplication [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_network_duplication is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_delete -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_delete [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_delete is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_io_stress -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_io_stress [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_memory_hog -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_memory_hog [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_memory_hog is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: disk_fill -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: disk_fill [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: disk_fill is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: pod_dns_error -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: pod_dns_error [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: pod_dns_error is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: versioned_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: versioned_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: versioned_tag is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ip_addresses -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ip_addresses [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: ip_addresses is worth: 0 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: operator_installed -> failed: false, skipped: NA: false, bonus: {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0} [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: operator_installed [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: liveness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: liveness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: liveness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: readiness -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: readiness [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: readiness is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_update -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_update [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_update is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_downgrade -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_downgrade [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_downgrade is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rolling_version_change -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rolling_version_change [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: rolling_version_change is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: rollback -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: rollback [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: rollback is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: deprecated_k8s_features -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: deprecated_k8s_features [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: deprecated_k8s_features is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: nodeport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: nodeport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: nodeport_not_used is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostport_not_used -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostport_not_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hostport_not_used is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hardcoded_ip_addresses_in_k8s_runtime_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: secrets_used -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: secrets_used [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_configmap -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_configmap [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_deploy -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_deploy [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_deploy is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_valid -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_valid [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_valid is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: helm_chart_published -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: helm_chart_published [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: helm_chart_published is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: no_local_volume_configuration -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: no_local_volume_configuration [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: no_local_volume_configuration is worth: 1 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: elastic_volumes -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: elastic_volumes [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: database_persistence -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: database_persistence [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: database_persistence is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: node_drain -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: node_drain [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: node_drain is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: service_account_mapping -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: service_account_mapping [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: service_account_mapping is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: privileged_containers -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: privileged_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: privileged_containers is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: non_root_containers -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: non_root_containers [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: non_root_containers is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: host_pid_ipc_privileges -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: host_pid_ipc_privileges [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: host_pid_ipc_privileges is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: linux_hardening -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: linux_hardening [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: cpu_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: cpu_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: cpu_limits is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: memory_limits -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: memory_limits [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: memory_limits is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: immutable_file_systems -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: immutable_file_systems [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: hostpath_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: hostpath_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: hostpath_mounts is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: ingress_egress_blocked -> failed: true, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: ingress_egress_blocked [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: insecure_capabilities -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: insecure_capabilities [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: insecure_capabilities is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: sysctls -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: sysctls [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: sysctls is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: log_output -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: log_output [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: log_output is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: prometheus_traffic -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: prometheus_traffic [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: open_metrics -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: open_metrics [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: routed_logs -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: routed_logs [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: tracing -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: tracing [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.total_max_tasks_points: Bonus tasks not counted in maximum [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: alpha_k8s_apis -> failed: false, skipped: NA: true, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: alpha_k8s_apis [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: alpha_k8s_apis is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: container_sock_mounts -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: container_sock_mounts [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: container_sock_mounts is worth: 100 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: require_labels -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: require_labels [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: require_labels is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: external_ips -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: external_ips [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: external_ips is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: selinux_options -> failed: false, skipped: NA: false, bonus: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: selinux_options [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: default_namespace -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: default_namespace [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: default_namespace is worth: 5 points [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Task: latest_tag -> failed: false, skipped: NA: false, bonus: [2025-07-10 12:14:52] DEBUG -- CNTI-CNFManager.Points.na_assigned?: NA status assigned for task: latest_tag [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.task_points: Task: latest_tag is worth: 100 points [2025-07-10 12:14:52] INFO -- CNTI-CNFManager.Points.total_max_tasks_points: Max points scored: 1955, max tasks passed: 54 for tags: ["workload"] [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 213, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1615, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1615, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 223} [2025-07-10 12:14:52] DEBUG -- CNTI: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1615, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1955} [2025-07-10 12:14:52] INFO -- CNTI: results yaml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.4", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite workload", "points" => 1615, "exit_code" => 0, "items" => [{"name" => "helm_chart_valid", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_chart_published", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "helm_deploy", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "cni_compatible", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "rollback", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "deprecated_k8s_features", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_update", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_downgrade", "status" => "passed", "type" => "", "points" => 5}, {"name" => "rolling_version_change", "status" => "passed", "type" => "", "points" => 5}, {"name" => "no_local_volume_configuration", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "elastic_volumes", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "database_persistence", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "symlink_file_system", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "privilege_escalation", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "insecure_capabilities", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "linux_hardening", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "ingress_egress_blocked", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "host_pid_ipc_privileges", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "immutable_file_systems", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "external_ips", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "sysctls", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "host_network", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "service_account_mapping", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "application_credentials", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "nodeport_not_used", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "secrets_used", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "immutable_configmap", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "alpha_k8s_apis", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "require_labels", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "default_namespace", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "operator_installed", "status" => "na", "type" => "bonus", "points" => 0}, {"name" => "versioned_tag", "status" => "passed", "type" => "", "points" => 5}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "prometheus_traffic", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "open_metrics", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "routed_logs", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "tracing", "status" => "skipped", "type" => "bonus", "points" => 0}, {"name" => "reasonable_image_size", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "reasonable_startup_time", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "service_discovery", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "shared_database", "status" => "na", "type" => "normal", "points" => 0}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "pod_network_latency", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "pod_network_corruption", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "disk_fill", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_delete", "status" => "passed", "type" => "normal", "points" => 5}, {"name" => "pod_memory_hog", "status" => "failed", "type" => "normal", "points" => 0}, {"name" => "pod_io_stress", "status" => "failed", "type" => "bonus", "points" => 0}, {"name" => "pod_dns_error", "status" => "skipped", "type" => "", "points" => 0}, {"name" => "pod_network_duplication", "status" => "passed", "type" => "bonus", "points" => 1}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1955} 2025-07-10 12:14:52,940 - functest_kubernetes.cnf_conformance.conformance - WARNING - elastic_volumes failed 2025-07-10 12:14:52,940 - functest_kubernetes.cnf_conformance.conformance - WARNING - privilege_escalation failed 2025-07-10 12:14:52,940 - functest_kubernetes.cnf_conformance.conformance - WARNING - linux_hardening failed 2025-07-10 12:14:52,940 - functest_kubernetes.cnf_conformance.conformance - WARNING - ingress_egress_blocked failed 2025-07-10 12:14:52,940 - functest_kubernetes.cnf_conformance.conformance - WARNING - non_root_containers failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - immutable_file_systems failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - service_account_mapping failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - immutable_configmap failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - reasonable_image_size failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - specialized_init_system failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - pod_memory_hog failed 2025-07-10 12:14:52,941 - functest_kubernetes.cnf_conformance.conformance - WARNING - pod_io_stress failed 2025-07-10 12:14:52,949 - functest_kubernetes.cnf_conformance.conformance - INFO - +-------------------------------------------------------------+-----------------+ | NAME | STATUS | +-------------------------------------------------------------+-----------------+ | helm_chart_valid | passed | | helm_chart_published | passed | | helm_deploy | passed | | cni_compatible | skipped | | increase_decrease_capacity | passed | | rollback | passed | | deprecated_k8s_features | passed | | rolling_update | passed | | rolling_downgrade | passed | | rolling_version_change | passed | | no_local_volume_configuration | passed | | elastic_volumes | failed | | database_persistence | skipped | | node_drain | passed | | symlink_file_system | passed | | privilege_escalation | failed | | insecure_capabilities | passed | | memory_limits | passed | | cpu_limits | passed | | linux_hardening | failed | | ingress_egress_blocked | failed | | host_pid_ipc_privileges | passed | | non_root_containers | failed | | privileged_containers | passed | | immutable_file_systems | failed | | hostpath_mounts | passed | | container_sock_mounts | passed | | external_ips | passed | | selinux_options | na | | sysctls | passed | | host_network | passed | | service_account_mapping | failed | | application_credentials | passed | | nodeport_not_used | passed | | hostport_not_used | passed | | hardcoded_ip_addresses_in_k8s_runtime_configuration | passed | | secrets_used | skipped | | immutable_configmap | failed | | alpha_k8s_apis | skipped | | require_labels | passed | | latest_tag | passed | | default_namespace | passed | | operator_installed | na | | versioned_tag | passed | | log_output | passed | | prometheus_traffic | skipped | | open_metrics | skipped | | routed_logs | skipped | | tracing | skipped | | reasonable_image_size | failed | | reasonable_startup_time | passed | | single_process_type | passed | | service_discovery | passed | | shared_database | na | | specialized_init_system | failed | | sig_term_handled | passed | | pod_network_latency | passed | | pod_network_corruption | passed | | disk_fill | passed | | pod_delete | passed | | pod_memory_hog | failed | | pod_io_stress | failed | | pod_dns_error | skipped | | pod_network_duplication | passed | | liveness | passed | | readiness | passed | +-------------------------------------------------------------+-----------------+ 2025-07-10 12:14:52,983 - xtesting.ci.run_tests - INFO - Test result: +--------------------------------+------------------+------------------+----------------+ | TEST CASE | PROJECT | DURATION | RESULT | +--------------------------------+------------------+------------------+----------------+ | cnf_testsuite_workload | functest | 14:58 | PASS | +--------------------------------+------------------+------------------+----------------+ 2025-07-10 12:14:53,325 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_uninstall cnf-config=example-cnfs/coredns/cnf-testsuite.yml Successfully uninstalled helm deployment "coredns". All CNF deployments were uninstalled, some time might be needed for all resources to be down. 2025-07-10 12:15:15,593 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite uninstall_all cnf-config=example-cnfs/coredns/cnf-testsuite.yml CNF uninstallation skipped. No CNF config found in installed_cnf_files directory.  Uninstalling testsuite helper tools. Testsuite helper tools uninstalled.